摘要:
Data processing apparatus distributes a public key certificate and information about a private key to a user terminal as activation information separately from a terminal module. In the case where the public key certification is vulnerable, it transmits only the activation information again.
摘要:
A computer program, method, and system for access control, which are capable of keeping and guaranteeing consistency of access control settings. A collector collects access control information and resource information which are set for each unit of processing such as an application and a file system and are transmitted from a transmitter, and stores them in an access control information memory. A combiner combines the collected access control information to create and store combined access control information in a combined access control information memory. A consistency adjuster analyzes the policies defined in the combined access control information stored in the combined access control information memory to detect inconsistency, and if inconsistency is detected, resolves the inconsistency according to an inconsistency measure policy. Thus, consistent filtering master information for the entire system is created and stored in a filtering master information memory.
摘要:
A content usage control system comprises a copyright holder system, content server, license server and user system. The ACL setting section of the copyright holder system sets a license ACL expressed as a structure by a combination of logic sums and logic products of a plurality of partial licenses for the content, based on the user ID and a plurality of physical element IDs including media used in the user system, and stores the license ACL in an access control list. The license server controls the usage of the content by the user utilizing the access control list.
摘要:
In an information system, a web server records web access logs of a client outside of a LAN. A mail server records transmission/reception logs of e-mails. A DB server records access right operation logs. A task application server records DB access log. An administrative server collects logs recorded in the web server, the mail server, the DB server, and the task application server, and operation logs of the client terminals to trace a person and an operation related to information leakage using the collected logs.
摘要:
Data processing apparatus distributes a public key certificate and information about a private key to a user terminal as activation information separately from a terminal module. In the case where the public key certification is vulnerable, it transmits only the activation information again.
摘要:
The present invention provides a system, which relates to request and response processes between a transmission source node and a transmission destination node, for autonomously selecting an optimum path by obtaining an actual response time per unit data length and estimating a response time for each path. Upon receipt of a response, which is returned from a transmission destination node 111, to a service request issued from the transmission source node (client), a path selecting apparatus calculates and stores an actual response time. The system comprises estimation individuals to be used for estimating a response time for each of clients, and makes each of the plurality of estimation individuals evolve into an estimation individual which can make a more preferable estimate by using a genetic algorithm, each time the actual response time is stored. When any of the clients requests a service of any of servers, the system calculates an estimated response time for each of the paths which can make a data communications with any of the servers by using the estimation individual, selects the path with the minimum estimated response time, and transmits the service request on the selected path.