PARTIAL GRANT SET EVALUATION FROM PARTIAL EVIDENCE IN AN EVIDENCE-BASED SECURITY POLICY MANAGER
First Claim
1. A data processing system, comprising:
- a policy manager using an evidence based security model that evaluates multiple pieces of evidence using a security policy to determine a set of granted permissions; and
an oracle for determining whether a first permission is granted based on a subset of the multiple pieces of evidence, the subset including less than all of the multiple pieces of evidence, wherein the policy manager, upon receiving a request for the first permission, queries the oracle to determine whether the first permission is granted based on the subset of the multiple pieces of evidence.
2 Assignments
0 Petitions
Accused Products
Abstract
An evidence-based policy manager generates a permission grant set for a code assembly received from a resource location. The policy manager executes in a computer system (e.g., a Web client or server) in combination with the verification module and class loader of the run-time environment. The permission grant set generated for a code assembly is applied in the run-time call stack to help the system determine whether a given system operation by the code assembly is authorized. The policy manager may determine a subset of the permission grant set based on a subset of the received code assembly'"'"'s evidence, in order to expedite processing of the code assembly. When the evidence subset does not yield the desired permission subset, the policy manager may then perform an evaluation of all evidence received.
-
Citations
23 Claims
-
1. A data processing system, comprising:
-
a policy manager using an evidence based security model that evaluates multiple pieces of evidence using a security policy to determine a set of granted permissions; and
an oracle for determining whether a first permission is granted based on a subset of the multiple pieces of evidence, the subset including less than all of the multiple pieces of evidence, wherein the policy manager, upon receiving a request for the first permission, queries the oracle to determine whether the first permission is granted based on the subset of the multiple pieces of evidence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. In an evidence based security model that evaluates, using a security policy, multiple pieces of evidence to determine a set of granted permissions, and wherein a piece of evidence is likely to determine whether a first permission is granted, a data structure stored in a computer memory, comprising:
-
a first portion corresponding to a first value of the piece of evidence and a plurality of permissions; and
a second portion corresponding to a second value of the piece of evidence and the plurality of permissions, wherein the data structure indicates, for each value/permission pair, that the permission is granted, or that the permission is either not granted or unknown. - View Dependent Claims (13)
-
-
14. In an evidence based security model that evaluates multiple pieces of evidence using a security policy to determine a set of granted permissions, and wherein a code assembly'"'"'s zone of origin is likely to determine whether a first permission is granted, and wherein prior to receiving a request to determine whether the first permission is granted, possible values of the zone of origin have been evaluated using the security policy to determine resultant permissions, and the results have been stored in a bitmap, a method for determining a subset of the permissions, comprising steps of:
-
(a) upon receiving a request to determine whether the first permission is granted, wherein the request comprises an instance of the zone of origin, determining whether the first permission is granted based on data stored in the bitmap; and
(b) when the first permission is not granted in step (a), performing a full evaluation of the multiple pieces of evidence based on the security policy. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. In an evidence based security model that evaluates multiple pieces of evidence using a security policy to determine a set of granted permissions, and wherein a subset of the multiple pieces of evidence is likely to determine whether a subset of permissions is granted, a method for determining the subset of permissions, comprising steps of:
-
(a) prior to receiving a request to determine whether the subset of permissions is granted, evaluating the subset of evidence using the security policy, based on the possible values of evidence contained in the subset of evidence, to determine resultant permissions, wherein the subset of evidence includes less than all of the multiple pieces of evidence;
(b) storing the results from step (a); and
(c) upon receiving a request to determine whether the subset of permissions is granted, wherein the request comprises an instance of the subset of evidence, querying the stored results to determine whether the subset of permissions is granted. - View Dependent Claims (22, 23)
-
Specification