METHOD, AN APPARATUS, A COMPUTER SYSTEM, A SECURITY COMPONENT AND A COMPUTER READABLE MEDIUM FOR DEFINING ACCESS RIGHTS IN METADATA-BASED FILE ARRANGEMENT
First Claim
1. A method for a computer system storing electronic objects being defined by metadata having at least one property with a value, the method comprising:
- determining effective access rights for a first object bydetermining one or more other objects being referred to by a metadata value of said first object;
retrieving security components of said one or more other objects; and
processing the security components of said one or more other objects according to a predefined set of rules to determine the effective access rights for the first object.
0 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for a computer system storing electronic objects being defined by metadata items. The method comprises deriving access rights from one or more security components originating from respective metadata items of at least one object, and determining the effective access rights for the object by means of the security components. The invention also relates to a method for a computer system storing electronic objects being defined by metadata items, wherein access rights for an object are determined by means of one or more pseudo-users. The invention also relates to an apparatus, a computer system and a computer readable medium comprising a computer program stored therein for carrying out the methods.
31 Citations
21 Claims
-
1. A method for a computer system storing electronic objects being defined by metadata having at least one property with a value, the method comprising:
determining effective access rights for a first object by determining one or more other objects being referred to by a metadata value of said first object; retrieving security components of said one or more other objects; and processing the security components of said one or more other objects according to a predefined set of rules to determine the effective access rights for the first object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. An apparatus comprising a processor, memory including computer program code, the memory and the computer program code configured to, with the processor, cause the apparatus to perform at least the following:
-
to store electronic objects being defined by metadata having at least one property with value; to determine effective access rights for a first object by determining one or more other objects referred by a metadata value of said first object; retrieving security components of said one or more other objects; and processing the security components of said one or more other objects according to a predefined set of rules to determine the effective access rights for the first object. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer system comprising:
-
at least one processor, at least one memory including computer program code, the memory and the computer program code configured to, with said at least one processor, cause the computer system at least to perform; to store electronic objects being defined by metadata having at least one property with value; to determine effective access rights for a first object by determining one or more other objects referred by a metadata value of said first object; retrieving security components of said one or more other objects; and processing the security components of said one or more other objects according to a predefined set of rules to determine the effective access rights for the first object. - View Dependent Claims (20)
-
-
21. A non-transitory computer readable medium comprising computer program instructions stored thereon, wherein said instructions, when executed, are for
to store electronic objects being defined by metadata having at least one property with value; to determine effective access rights for a first object by determining one or more other objects referred by a metadata value of said first object; retrieving security components of said one or more other objects; and processing the security components of said one or more other objects according to a predefined set of rules to determine the effective access rights for the first object.
Specification