DE69706440D1 - Schutzmittel in einem verteilten rechnersystem - Google Patents
Schutzmittel in einem verteilten rechnersystemInfo
- Publication number
- DE69706440D1 DE69706440D1 DE69706440T DE69706440T DE69706440D1 DE 69706440 D1 DE69706440 D1 DE 69706440D1 DE 69706440 T DE69706440 T DE 69706440T DE 69706440 T DE69706440 T DE 69706440T DE 69706440 D1 DE69706440 D1 DE 69706440D1
- Authority
- DE
- Germany
- Prior art keywords
- computer system
- distributed computer
- protective agents
- agents
- protective
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/547—Remote procedure calls [RPC]; Web services
- G06F9/548—Object oriented; Remote method invocation [RMI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/30—Managing network names, e.g. use of aliases or nicknames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/30—Managing network names, e.g. use of aliases or nicknames
- H04L61/3015—Name registration, generation or assignment
- H04L61/3025—Domain name generation or assignment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/35—Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1483—Protection against unauthorised use of memory or access to memory by checking the subject access rights using an access-table, e.g. matrix or list
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
- Devices For Executing Special Programs (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB1997/000025 WO1998032073A1 (en) | 1997-01-17 | 1997-01-17 | Protecting resources in a distributed computer system |
Publications (2)
Publication Number | Publication Date |
---|---|
DE69706440D1 true DE69706440D1 (de) | 2001-10-04 |
DE69706440T2 DE69706440T2 (de) | 2002-05-16 |
Family
ID=11004521
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE69706440T Expired - Lifetime DE69706440T2 (de) | 1997-01-17 | 1997-01-17 | Schutzmittel in einem verteilten rechnersystem |
Country Status (6)
Country | Link |
---|---|
US (1) | US6658573B1 (de) |
EP (1) | EP0953172B1 (de) |
JP (1) | JP3381927B2 (de) |
KR (1) | KR100373526B1 (de) |
DE (1) | DE69706440T2 (de) |
WO (1) | WO1998032073A1 (de) |
Families Citing this family (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6760746B1 (en) | 1999-09-01 | 2004-07-06 | Eric Schneider | Method, product, and apparatus for processing a data request |
US6633984B2 (en) * | 1999-01-22 | 2003-10-14 | Sun Microsystems, Inc. | Techniques for permitting access across a context barrier on a small footprint device using an entry point object |
US9141717B2 (en) | 1999-03-22 | 2015-09-22 | Esdr Network Solutions Llc | Methods, systems, products, and devices for processing DNS friendly identifiers |
USRE43690E1 (en) | 1999-03-22 | 2012-09-25 | Esdr Network Solutions Llc | Search engine request method, product, and apparatus |
US6338082B1 (en) | 1999-03-22 | 2002-01-08 | Eric Schneider | Method, product, and apparatus for requesting a network resource |
US7188138B1 (en) * | 1999-03-22 | 2007-03-06 | Eric Schneider | Method, product, and apparatus for resource identifier registration and aftermarket services |
USRE44207E1 (en) | 1999-09-01 | 2013-05-07 | Esdr Network Solutions Llc | Network resource access method, product, and apparatus |
CN1372663A (zh) * | 1999-09-03 | 2002-10-02 | 通用器材公司 | 资源访问控制*** |
EP1113361A1 (de) * | 2000-01-03 | 2001-07-04 | Wimba.Com S.A. | Kommunikationsverfahren zwischen einem Applet und einem lokalen Agent über einen Socket-Kommunikationskanal |
GB0020441D0 (en) * | 2000-08-18 | 2000-10-04 | Hewlett Packard Co | Performance of a service on a computing platform |
US7096466B2 (en) * | 2001-03-26 | 2006-08-22 | Sun Microsystems, Inc. | Loading attribute for partial loading of class files into virtual machines |
US7237257B1 (en) * | 2001-04-11 | 2007-06-26 | Aol Llc | Leveraging a persistent connection to access a secured service |
US7117489B2 (en) * | 2001-06-20 | 2006-10-03 | Sun Microsystems, Inc. | Optional attribute generator for customized Java programming environments |
US6964033B2 (en) * | 2001-06-20 | 2005-11-08 | Sun Microsystems, Inc. | Object band customization of Java runtime environments |
US7155728B1 (en) * | 2001-06-28 | 2006-12-26 | Microsoft Corporation | Remoting features |
US20030018909A1 (en) * | 2001-07-17 | 2003-01-23 | International Business Machines Corporation | Method and apparatus for enforcing security policies in Java applications |
GB0212314D0 (en) * | 2002-05-28 | 2002-07-10 | Symbian Ltd | Secure mobile wireless device |
US20030237005A1 (en) * | 2002-06-21 | 2003-12-25 | Yuval Bar-Or | Method and system for protecting digital objects distributed over a network by electronic mail |
CA2402717C (en) * | 2002-09-10 | 2013-04-09 | Research In Motion Limited | User interface and method of adapting a sensor signal to actuate multiple dimensions |
US7453448B2 (en) * | 2002-09-10 | 2008-11-18 | Research In Motion Limited | User interface and method of adapting a sensor signal to actuate multiple dimensions |
FR2846770B1 (fr) * | 2002-11-04 | 2005-01-28 | Oberthur Card Syst Sa | Carte a microcircuit comportant des moyens de publication de ses objets informatiques |
US20050005105A1 (en) * | 2003-06-24 | 2005-01-06 | Brown Larry Cecil | Remote access control feature for limiting access to configuration file components |
FR2864658B1 (fr) * | 2003-12-30 | 2006-02-24 | Trusted Logic | Controle d'acces aux donnees par verification dynamique des references licites |
US7640573B2 (en) | 2004-02-16 | 2009-12-29 | Microsoft Corporation | Generic security claim processing model |
US7716728B2 (en) * | 2004-02-16 | 2010-05-11 | Microsoft Corproation | Security scopes and profiles |
US7873831B2 (en) * | 2004-02-26 | 2011-01-18 | Microsoft Corporation | Digests to identify elements in a signature process |
US7950000B2 (en) * | 2004-03-17 | 2011-05-24 | Microsoft Corporation | Architecture that restricts permissions granted to a build process |
US8607299B2 (en) * | 2004-04-27 | 2013-12-10 | Microsoft Corporation | Method and system for enforcing a security policy via a security virtual machine |
US20070233883A1 (en) * | 2004-05-04 | 2007-10-04 | Paolo De Lutiis | Method and System for Access Control in Distributed Object-Oriented Systems |
US7484247B2 (en) | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
US7793350B2 (en) * | 2004-10-28 | 2010-09-07 | International Business Machines Corporation | Apparatus, system, and method for simulated access to restricted computing resources |
GB2422453A (en) * | 2005-01-22 | 2006-07-26 | Hewlett Packard Development Co | Dynamically allocating resources according to a privacy policy |
US7574700B2 (en) * | 2005-03-31 | 2009-08-11 | Sun Microsystems, Inc. | Supporting dynamically-typed languages in typed assembly languages |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US8505029B1 (en) * | 2007-11-26 | 2013-08-06 | Adobe Systems Incorporated | Virtual machine communication |
US8046778B1 (en) | 2007-11-26 | 2011-10-25 | Adobe Systems Incorporated | Managing device application program interfaces |
US8209685B1 (en) | 2007-11-26 | 2012-06-26 | Adobe Systems Incorporated | Virtual machine device access |
US9166797B2 (en) * | 2008-10-24 | 2015-10-20 | Microsoft Technology Licensing, Llc | Secured compartment for transactions |
CN102073597B (zh) * | 2009-11-19 | 2016-04-13 | 北京明朝万达科技股份有限公司 | 一种基于用户身份认证的操作***盘全盘加密方法 |
JP5739182B2 (ja) | 2011-02-04 | 2015-06-24 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 制御システム、方法およびプログラム |
JP5731223B2 (ja) | 2011-02-14 | 2015-06-10 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 異常検知装置、監視制御システム、異常検知方法、プログラムおよび記録媒体 |
JP5689333B2 (ja) | 2011-02-15 | 2015-03-25 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 異常検知システム、異常検知装置、異常検知方法、プログラムおよび記録媒体 |
US8918841B2 (en) * | 2011-08-31 | 2014-12-23 | At&T Intellectual Property I, L.P. | Hardware interface access control for mobile applications |
US8898459B2 (en) | 2011-08-31 | 2014-11-25 | At&T Intellectual Property I, L.P. | Policy configuration for mobile device applications |
US10146515B1 (en) * | 2015-03-10 | 2018-12-04 | Twitter, Inc. | Live code updates |
US10956136B2 (en) | 2018-10-16 | 2021-03-23 | Ebay, Inc. | User interface resource file optimization |
KR102239902B1 (ko) * | 2019-06-03 | 2021-04-13 | 김덕우 | 보조기억장치에서의 파일시스템 보호장치 및 방법 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3173004B2 (ja) * | 1990-09-06 | 2001-06-04 | 日本電気株式会社 | アクセス権制御方式 |
US5577252A (en) * | 1993-07-28 | 1996-11-19 | Sun Microsystems, Inc. | Methods and apparatus for implementing secure name servers in an object-oriented system |
US5717911A (en) * | 1995-01-23 | 1998-02-10 | Tandem Computers, Inc. | Relational database system and method with high availability compliation of SQL programs |
US5857102A (en) * | 1995-03-14 | 1999-01-05 | Sun Microsystems, Inc. | System and method for determining and manipulating configuration information of servers in a distributed object environment |
GB2301912A (en) * | 1995-06-09 | 1996-12-18 | Ibm | Security for computer system resources |
US5745683A (en) * | 1995-07-05 | 1998-04-28 | Sun Microsystems, Inc. | System and method for allowing disparate naming service providers to dynamically join a naming federation |
JP3738787B2 (ja) * | 1995-10-19 | 2006-01-25 | 富士ゼロックス株式会社 | 資源管理装置及び資源管理方法 |
US5944793A (en) * | 1996-11-21 | 1999-08-31 | International Business Machines Corporation | Computerized resource name resolution mechanism |
US6145083A (en) * | 1998-04-23 | 2000-11-07 | Siemens Information And Communication Networks, Inc. | Methods and system for providing data and telephony security |
US6205466B1 (en) * | 1998-07-17 | 2001-03-20 | Hewlett-Packard Company | Infrastructure for an open digital services marketplace |
-
1997
- 1997-01-17 EP EP97900074A patent/EP0953172B1/de not_active Expired - Lifetime
- 1997-01-17 US US09/341,739 patent/US6658573B1/en not_active Expired - Lifetime
- 1997-01-17 WO PCT/IB1997/000025 patent/WO1998032073A1/en active IP Right Grant
- 1997-01-17 JP JP53332398A patent/JP3381927B2/ja not_active Expired - Fee Related
- 1997-01-17 KR KR10-1999-7006161A patent/KR100373526B1/ko not_active IP Right Cessation
- 1997-01-17 DE DE69706440T patent/DE69706440T2/de not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
US6658573B1 (en) | 2003-12-02 |
WO1998032073A1 (en) | 1998-07-23 |
JP3381927B2 (ja) | 2003-03-04 |
JP2000508104A (ja) | 2000-06-27 |
EP0953172B1 (de) | 2001-08-29 |
KR20000069948A (ko) | 2000-11-25 |
EP0953172A1 (de) | 1999-11-03 |
DE69706440T2 (de) | 2002-05-16 |
KR100373526B1 (ko) | 2003-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69706440D1 (de) | Schutzmittel in einem verteilten rechnersystem | |
DE69830709D1 (de) | Integritätsschutz in einem telekommunikationssystem | |
DE69517206D1 (de) | Virenschutz in rechnersystemen | |
DE69803575D1 (de) | Visualisierung in einem modularen softwaresystem | |
KR960011695A (ko) | 컴퓨터 시스템 | |
DE69811295D1 (de) | Fahrradcomputer | |
DE69327576D1 (de) | Paralleles Rechnersystem | |
NO950780D0 (no) | Datamaskin-system | |
KR960011629A (ko) | 컴퓨터 시스템 | |
DE69804548D1 (de) | Computergehäuse | |
DE69423034D1 (de) | Tragbares Rechnersystem | |
DE69715967D1 (de) | Quorummechanismus in einem verteilten Zweiknotenrechnersystem | |
DE69433077D1 (de) | Software-Verteilungsschutzverfahren | |
DE69801418D1 (de) | Datenaufteilung und -dupliziering in einem verteilten datenverarbeitungssystem | |
DE69705507D1 (de) | Ereignisversammlung in einem verteilten objektsystem | |
IT1267375B1 (it) | Elaboratore elettronico | |
DE69628984D1 (de) | Computergehäuse | |
DE69825350D1 (de) | Verzweigungsvorhersage in Rechnersystem | |
FI972843A (fi) | Tietokonejärjestelmä | |
DE69733101D1 (de) | Datenüberlaufverwaltung in einem Rechnersystem | |
DE69841787D1 (de) | Prozessverwaltunssystem in einem computernetzwerk | |
DE69802290D1 (de) | Gemeinsame unterbrechungsverarbeitung in einem datenverarbeitungssystem | |
DE69940784D1 (de) | Tiv ausgeführten jobs in einem multiverarbeitungssystem | |
DE69810098D1 (de) | Leseoperationen in einem multiprozessorrechnersystem | |
DE59508626D1 (de) | Objektschutz in einem Funksystem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition | ||
8320 | Willingness to grant licences declared (paragraph 23) | ||
8328 | Change in the person/name/address of the agent |
Representative=s name: DUSCHER, R., DIPL.-PHYS. DR.RER.NAT., PAT.-ANW., 7 |
|
R082 | Change of representative |
Ref document number: 953172 Country of ref document: EP Representative=s name: PFENNING MEINIG & PARTNER GBR, DE |