Providing access control via the layer manager
First Claim
1. A method for providing access control in a protocol stack, comprising the steps of:
- (a) receiving a request to perform an operation at a layer of the protocol stack;
(b) calling an access mediator;
(c) determining if the request is to be granted based upon a predetermined security policy by the access mediator; and
(d) providing the determination by the access mediator.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for access control within a protocol stack includes: receiving a request to perform an operation at a layer of the protocol stack; calling an access mediator; determining if the request is to be granted based upon a predetermined security policy by the access mediator; and providing the determination by the access mediator. The Access Mediator is a software which embodies the rules of a predetermined security policy. In the preferred embodiment, the security policy is subject (people) based. The rules of the security policy determines which subjects can have access to which objects (data) to perform a requested operation (read/write). The Access Mediator is called to determine whether or not a request to perform an operation is to be granted based upon the security policy. In this manner, access control is provided within the protocol stack.
4 Citations
17 Claims
-
1. A method for providing access control in a protocol stack, comprising the steps of:
-
(a) receiving a request to perform an operation at a layer of the protocol stack;
(b) calling an access mediator;
(c) determining if the request is to be granted based upon a predetermined security policy by the access mediator; and
(d) providing the determination by the access mediator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for providing access control in a protocol stack, comprising the steps of:
-
(a) receiving a request by a layer of the protocol stack to perform an operation at the layer;
(b) calling an access mediator by the layer;
(c) determining if the request is to be granted based upon a predetermined security policy by the access mediator; and
(d) providing the determination by the access mediator to the layer.
-
-
14. A method for providing access control in a protocol stack, comprising the steps of:
-
(a) receiving a request by a layer manager to perform an operation at a layer of the protocol stack;
(b) calling an access mediator by the layer manager;
(c) determining if the request is to be granted based upon a predetermined security policy by the access mediator; and
(d) providing the determination by the access mediator to the layer manager.
-
-
15. A system, comprising:
-
a plurality of layers of a protocol stack; and
an access mediator, wherein each layer of the protocol stack may call the access mediator to determine if a request to perform an operation at a layer of the protocol stack is to be granted.
-
-
16. A system, comprising:
-
a plurality of layers of a protocol stack; and
a layer manager, wherein the layer manager is interfaced with each of the plurality of stack components, wherein the layer manager comprises an access mediator, wherein layer manager may call the access mediator to determine if a request to perform an operation at a layer of the protocol stack is to be granted.
-
-
17. A computer readable medium with program instructions for providing access control in a protocol stack, comprising the steps of:
-
(a) receiving a request to perform an operation at a layer of the protocol stack;
(b) calling an access mediator;
(c) determining if the request is to be granted based upon a predetermined security policy by the access mediator; and
(d) providing the determination by the access mediator.
-
Specification