首页> 外国专利> ACCESS CONTROLS THROUGH NODE-BASED EFFECTIVE POLICY IDENTIFIERS

ACCESS CONTROLS THROUGH NODE-BASED EFFECTIVE POLICY IDENTIFIERS

机译:通过基于节点的有效策略标识符进行访问控制

摘要

Techniques for implementing a node-based access control system are described herein. In various embodiments, a server computer stores a node based access control policy system wherein each node identifies a resource and an access control policy for the resource. The server computer identifies an access control policy for a first node and an identifier of a second node wherein the second node is a parent node to the first node. The server computer maps an effective access control policy identifier to the access control policy for the first node and the identifier of the second node. The server computer stores data associating the effective access control policy identifier with the first node. The server computer identifies an access control policy for a third node and an identifier of the second node, wherein the second node is a parent node to the third node and wherein the access control policy for the third node is equivalent to the access control policy for the first node. The server computer then stores data associating the effective access control policy identifier with the third node.
机译:本文描述了用于实现基于节点的访问控制系统的技术。在各种实施例中,服务器计算机存储基于节点的访问控制策略系统,其中每个节点标识资源和针对该资源的访问控制策略。服务器计算机标识用于第一节点的访问控制策略和第二节点的标识符,其中第二节点是第一节点的父节点。服务器计算机将有效的访问控制策略标识符映射到第一节点的访问控制策略和第二节点的标识符。服务器计算机存储将有效访问控制策略标识符与第一节点相关联的数据。服务器计算机标识用于第三节点的访问控制策略和第二节点的标识符,其中第二节点是第三节点的父节点,并且其中用于第三节点的访问控制策略等效于用于第一个节点。然后,服务器计算机存储将有效访问控制策略标识符与第三节点相关联的数据。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号