System and method for applying a file system security model to a query system
First Claim
Patent Images
1. A system, comprising:
- a storage device configured to store data;
a file system configured to manage access to said storage device, to store file system content, and to implement a first security model, wherein said first security model is configured to control access to said file system content;
a query system configured to query said file system content; and
security mapping functionality configured to apply said first security model to said query system.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method for applying a file system security model to a query system. In one embodiment, the system may include a storage device configured to store data and a file system configured to manage access to the storage device, to store file system content, and to implement a first security model, where the first security model is configured to control access to the file system content. The system may further include a query system configured to query the file system content, and security mapping functionality configured to apply the first security model to the query system.
-
Citations
27 Claims
-
1. A system, comprising:
-
a storage device configured to store data;
a file system configured to manage access to said storage device, to store file system content, and to implement a first security model, wherein said first security model is configured to control access to said file system content;
a query system configured to query said file system content; and
security mapping functionality configured to apply said first security model to said query system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
storing file system content;
implementing a first security model, wherein said first security model is configured to control access to said file system content; and
applying said first security model to a query system configured to query said file system content. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-accessible medium comprising program instructions, wherein the program instructions are executable to:
-
store file system content;
implement a first security model, wherein said first security model is configured to control access to said file system content; and
apply said first security model to a query system configured to query said file system content. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification