System and method for multi-level security filtering of model representations
First Claim
1. A method, in a data processing system comprising a processor and a memory, for modifying an original model based on a security level of a user, comprising:
- receiving a user request for access to the original model;
identifying a security level associated with the user;
comparing the security level of the user with security characteristic information of one or more model elements within the original model;
modifying the original model based on results of the comparison and application of one or more transformation rules, to model elements and their relationships in the original model, for transforming the original model into a modified model based on the security level of the user; and
presenting the modified model to the user in response to the user request for access to the original model.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for multi-level security filtering of model representations. Elements of an architecture and systems engineering model have associated security characteristics identifying the required level of security that a user must have in order to be able to obtain access to information about that element of the model. Based on these security characteristics and the security level of a user attempting to access the model, the content of the model is modified such that elements that are not accessible by a user having that security level are obscured or not visible to the user. The other elements of the model which are accessible by the user based on his/her security level are modified in the modified model so as to not provide information that would disclose the nature, character, or in some cases even the presence, of the elements that are not accessible by the user based on his/her security level.
16 Citations
20 Claims
-
1. A method, in a data processing system comprising a processor and a memory, for modifying an original model based on a security level of a user, comprising:
-
receiving a user request for access to the original model; identifying a security level associated with the user; comparing the security level of the user with security characteristic information of one or more model elements within the original model; modifying the original model based on results of the comparison and application of one or more transformation rules, to model elements and their relationships in the original model, for transforming the original model into a modified model based on the security level of the user; and presenting the modified model to the user in response to the user request for access to the original model. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product comprising a computer useable readable storage medium having a computer readable program stored thereon, wherein the computer readable program, when executed on a computing device, causes the computing device to:
-
receive a user request for access to the original model; identify a security level associated with the user; compare the security level of the user with security characteristic information of one or more model elements within the original model; modify the original model based on results of the comparison and application of one or more transformation rules, to model elements and their relationships in the original model, for transforming the original model into a modified model based on the security level of the user; and present the modified model to the user in response to the user request for access to the original model. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system comprising:
-
a processor; and a memory coupled to the processor, wherein the memory comprises instructions which, when executed by the processor, cause the processor to; receive a user request for access to the original model; identify a security level associated with the user; compare the security level of the user with security characteristic information of one or more model elements within the original model; modify the original model based on results of the comparison and application of one or more transformation rules, to model elements and their relationships in the original model, for transforming the original model into a modified model based on the security level of the user; and present the modified model to the user in response to the user request for access to the original model.
-
Specification