GB2533674B - Controlling access to a computing resource - Google Patents
Controlling access to a computing resourceInfo
- Publication number
- GB2533674B GB2533674B GB1517363.6A GB201517363A GB2533674B GB 2533674 B GB2533674 B GB 2533674B GB 201517363 A GB201517363 A GB 201517363A GB 2533674 B GB2533674 B GB 2533674B
- Authority
- GB
- United Kingdom
- Prior art keywords
- computing resource
- controlling access
- access
- controlling
- resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/90335—Query processing
- G06F16/90344—Query processing by using string matching techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1517363.6A GB2533674B (en) | 2015-10-01 | 2015-10-01 | Controlling access to a computing resource |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1517363.6A GB2533674B (en) | 2015-10-01 | 2015-10-01 | Controlling access to a computing resource |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201517363D0 GB201517363D0 (en) | 2015-11-18 |
GB2533674A GB2533674A (en) | 2016-06-29 |
GB2533674B true GB2533674B (en) | 2017-02-01 |
Family
ID=54605947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1517363.6A Active GB2533674B (en) | 2015-10-01 | 2015-10-01 | Controlling access to a computing resource |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2533674B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002005185A1 (en) * | 2000-07-10 | 2002-01-17 | Oblix, Inc. | Query string processing |
WO2003107224A1 (en) * | 2002-06-18 | 2003-12-24 | Arizona Board Of Regents, Acting For Arizona State University | Assignment and management of authentication & authorization |
-
2015
- 2015-10-01 GB GB1517363.6A patent/GB2533674B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002005185A1 (en) * | 2000-07-10 | 2002-01-17 | Oblix, Inc. | Query string processing |
WO2003107224A1 (en) * | 2002-06-18 | 2003-12-24 | Arizona Board Of Regents, Acting For Arizona State University | Assignment and management of authentication & authorization |
Non-Patent Citations (1)
Title |
---|
"Dynamic programming and edit distance", LANGMEAD * |
Also Published As
Publication number | Publication date |
---|---|
GB201517363D0 (en) | 2015-11-18 |
GB2533674A (en) | 2016-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZA201907128B (en) | Securing a second object to a first object | |
GB2580824B (en) | Virtual access to a limited-access object | |
HK1252999A1 (en) | General-purpose parallel computing architecture | |
HK1256690B (en) | Managing access to resources | |
GB201503082D0 (en) | Resource management | |
GB201513629D0 (en) | Access control | |
GB201621064D0 (en) | Version control for resource allocation modeling | |
EP3149886A4 (en) | Controlling access to a resource via a computing device | |
HK1251673A1 (en) | Hacking-resistant computer design | |
IL255046A0 (en) | Biosequence-based approach to analyzing binaries | |
GB201503080D0 (en) | Resource management | |
GB2569270B (en) | Parallel computing | |
GB201507720D0 (en) | Access provision | |
GB2515456B (en) | Resource Control | |
GB201515904D0 (en) | Controlling access to web resources | |
SG11201701412UA (en) | Computing environment selection techniques | |
GB201501079D0 (en) | Controlling access to content | |
GB201715771D0 (en) | Controlling access to resource functions at a control point of the resource via a user device | |
HK1249231A1 (en) | Controlling access to an interface with a dongle | |
GB201420104D0 (en) | Management of a computing system with dynamic change of role | |
GB201720914D0 (en) | Improvements relating to access control mechanisms | |
EP3387530C0 (en) | Secure computing | |
GB2533674B (en) | Controlling access to a computing resource | |
GB2529617B (en) | Computing devices | |
SG11201608172XA (en) | Resource allocation |