×

SECURITY SENSITIVE DATA FLOW ANALYSIS

  • US 20110231317A1
  • Filed: 03/19/2010
  • Published: 09/22/2011
  • Est. Priority Date: 03/19/2010
  • Status: Abandoned Application
First Claim
Patent Images

1. A computer readable storage medium having computer readable instructions tangibly stored thereon which when executed by the computer, cause the computer to perform a method for security-aware data flow analysis, the method comprising:

  • receiving a delegation request from a first user to delegate a task to a second user;

    allocating permission to the second user to perform the task if no organizational policies are violated;

    retrieving data used in the task via a data to task association;

    retrieving one or more data to role mappings of the data used in the task and one or more permissions associated with the one or more data to role mappings of the data used in the task; and

    determining if access to the data used in the task can be granted to the second user based on the one or more data to role mappings of the data used in the task and the one or more permissions associated with the one or more data role to mappings of the data used in the task; and

    granting access to the data used in the task to the second user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×