SYSTEM AND METHODS PROVIDING ENHANCED SECURITY MODEL
First Claim
1. A method to facilitate data item security, comprising:
- defining at least one security policy for a hierarchical data structure;
defining at least one security region for the hierarchical data structure; and
applying the security policy to the hierarchical data structure from the security region.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a system and methodology to facilitate security for data items residing within (or associated with) a hierarchical database or storage structure. A database security system is provided having a hierarchical data structure associated with one or more data items. The system includes a security component that applies a security policy to the data items from a global location or region associated with a database. Various components and processes are employed to enable explicit and/or inherited security properties to be received by and propagated to the data items depending on the type of data structure encountered or processed.
-
Citations
12 Claims
-
1. A method to facilitate data item security, comprising:
-
defining at least one security policy for a hierarchical data structure;
defining at least one security region for the hierarchical data structure; and
applying the security policy to the hierarchical data structure from the security region. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system to facilitate database security processing, comprising:
-
means for defining a security policy;
means for determining a security region for the security policy; and
means for applying the security policy to at least one of a tree structure and a containment hierarchy in accordance with the security region.
-
-
9. A computer readable medium having a data structure stored thereon, comprising:
-
a first data field related to a security region associated with a hierarchical data structure;
a second data field that relates to a security policy; and
a third data field that links the security policy to the security region. - View Dependent Claims (10, 11, 12)
-
Specification