CLOUD-BASED ACCESS CONTROL LIST
First Claim
1. A system that facilitates data management, comprising:
- an interface component that receives a data request from a user; and
a cloud-based data auditing system that analyzes the request and selectively renders data in response to the request as a function of an access control list (ACL).
2 Assignments
0 Petitions
Accused Products
Abstract
A system that can assist users to manage a personal active directory for all of their information maintained within a cloud-based environment is provided. The identity of a client that accesses data is monitored and recorded in a log. In turn, this information can be made available to the owner of the information in order to develop a desired access control list (ACL). Additionally, the system can employ a heuristic component that can automatically establish the ACL on the owner'"'"'s behalf. As well, the system can track how information is being accessed (or attempted to be accessed) by other people therefore, giving the owner of the information the opportunity to restrict or allow access based upon any number of recorded factors (e.g., identity, context).
-
Citations
20 Claims
-
1. A system that facilitates data management, comprising:
-
an interface component that receives a data request from a user; and a cloud-based data auditing system that analyzes the request and selectively renders data in response to the request as a function of an access control list (ACL). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method of managing data, comprising:
-
analyzing a data item; establishing an identity of an owner of the data; and automatically generating an access control list (ACL) that corresponds to the owner based at least in part upon the analyzed data item. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer-executable system that facilitates controlling access to data, comprising:
-
computer-implemented means for analyzing a data item; computer-implemented means for establishing an identity of an owner of the data item; and computer-implemented means for automatically establishing an access control list (ACL) based at least in part upon the analysis of the data item. - View Dependent Claims (20)
-
Specification