FIELD: information technology.
SUBSTANCE: if a user is not denied and is not granted access to an object, according to policy, it is determined whether the user is granted access to the object through an access control list for the object. A decision is then made on whether the user has access to the object as defined by the above-mentioned steps.
EFFECT: simple user access to data with data with different degree of accessibility, possibility of determining whether a user is denied or granted access to an object based on the access policy.
11 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHODS OF PROVIDING ENHANCED SECURITY MODEL | 2004 |
|
RU2564850C2 |
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION | 2003 |
|
RU2337399C2 |
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION | 2008 |
|
RU2390838C2 |
DETECTABILITY AND LISTING MECHANISM IN HIERARCHICALLY PROTECTED DATA STORAGE SYSTEM | 2006 |
|
RU2408070C2 |
METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED ACCESS TO CORPORATE NETWORK OBJECTS | 2022 |
|
RU2799117C1 |
METHOD AND SYSTEM FOR DISPLAY AND CONTROL OF INFORMATION RELATED TO SAFETY | 2005 |
|
RU2385490C2 |
SYSTEM AND METHOD OF AUTOMATIC DEPLOYMENT OF THE ENCRYPTION SYSTEM FOR USERS WHO PREVIOUSLY WORKED ON PC | 2013 |
|
RU2618684C2 |
SYSTEMS AND METHODS FOR CREATING AND MODIFYING ACCESS LISTS | 2015 |
|
RU2679179C1 |
SYSTEMS AND METHODS FOR NETWORK ANALYSIS AND REPORTING | 2015 |
|
RU2677378C2 |
ACCESSING DATA BEFORE ENTERING SYSTEM | 2004 |
|
RU2392661C2 |
Authors
Dates
2011-09-27—Published
2007-01-04—Filed