×

TECHNIQUE FOR EFFICIENTLY EVALUATING A SECURITY POLICY

  • US 20090276824A1
  • Filed: 05/05/2008
  • Published: 11/05/2009
  • Est. Priority Date: 05/05/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-executed method for efficiently evaluating a security policy, comprising:

  • retrieving one or more roles associated with a user;

    if the ACE exists in the session-level cache and is associated with the one or more roles, retrieving a set of access control entries (ACEs) associated with the one or more roles from a session-level cache, otherwise, generating a set of ACEs that is associated with the one or more roles from an access control list (ACL);

    updating the one or more roles associated with the user;

    updating the set of ACEs based on the updated one or more roles and the access control list; and

    subsequently updating the session-level cache so that the updated set of ACEs is associated with the updated one or more roles.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×