Taint vector locations and granularity
    31.
    发明申请
    Taint vector locations and granularity 审中-公开
    污染矢量位置和粒度

    公开(公告)号:US20150128262A1

    公开(公告)日:2015-05-07

    申请号:US13317825

    申请日:2011-10-28

    Abstract: An embodiment or embodiments of a computing system can be adapted to manage security risk by accumulating and monitoring taint indications, and can respond to predetermined taint conditions detecting by the monitoring. An illustrative computing system can comprise a plurality of resources operationally coupled into the computing system, and at least one taint vector operable to list a plurality of taints indicative of potential security risk associated with a selected location and granularity of selected ones of the plurality of resources.

    Abstract translation: 计算系统的一个或多个实施例可以适于通过累积和监视污点指示来管理安全风险,并且可以响应于由监视检测到的预定的污点状况。 示例性计算系统可以包括可操作地耦合到计算系统中的多个资源,以及至少一个调色矢量,其可操作以列出指示与所选择的多个资源中的所选择的位置和粒度相关联的潜在安全风险的多个指示 。

    Fine-grained security in federated data sets
    32.
    发明授权
    Fine-grained security in federated data sets 有权
    联合数据集中的细粒度安全

    公开(公告)号:US08943313B2

    公开(公告)日:2015-01-27

    申请号:US13136401

    申请日:2011-07-29

    CPC classification number: G06F21/52 G06F21/606 G06F21/62 G06F21/72

    Abstract: A data processing system, a server such as a federated server, a computer system, and like devices, and associated operating methods can be configured to support fine-grained security including resource allocation and resource scheduling. A data processing system can comprise a federated server operable to access data distributed among a plurality of remote data sources upon request from a plurality of client users and applications; and logic executable on the federated server. The logic can be operable to enforce fine-grained security operations on a plurality of federated shared data sets distributed among the plurality of remote data sources.

    Abstract translation: 数据处理系统,诸如联合服务器的服务器,计算机系统等相关操作方法可以被配置为支持包括资源分配和资源调度在内的细粒度安全性。 数据处理系统可以包括联合服务器,其可操作以根据来自多个客户端用户和应用的请求来访问分布在多个远程数据源中的数据; 并在联合服务器上执行逻辑。 逻辑可以用于在分布在多个远程数据源之间的多个联合共享数据集上执行细粒度的安全操作。

    Instruction set adapted for security risk monitoring

    公开(公告)号:US20130081134A1

    公开(公告)日:2013-03-28

    申请号:US13200547

    申请日:2011-09-24

    CPC classification number: G06F21/577 G06F21/552

    Abstract: A processor is adapted to manage security risk by updating and monitoring a taint storage element in response to receipt of taint indicators, and responding to predetermined taint conditions detecting by the monitoring. The processor can be operable to execute instructions of a defined instruction set architecture and comprises an instruction of the instruction set architecture operable to access data from a source and operable to receive a taint indicator indicative of potential security risk associated with the data. The processor can further comprise a taint storage element operable for updating in response to receipt of the taint indicator and logic. The logic can be operable to update the taint storage element, process the taint storage element, determine a security risk condition based on the processing of the taint storage element, and respond to the security risk condition.

    Intrusion detection using taint accumulation
    40.
    发明申请
    Intrusion detection using taint accumulation 有权
    入侵检测使用污染积累

    公开(公告)号:US20130024937A1

    公开(公告)日:2013-01-24

    申请号:US13199368

    申请日:2011-08-26

    CPC classification number: G06F21/577 H04L63/14

    Abstract: A method operable in a computing device adapted for handling security risk can use taint accumulation to detect intrusion. The method can comprise receiving a plurality of taint indicators indicative of potential security risk from a plurality of distinct sources at distinct times, and accumulating the plurality of taint indicators independently using a corresponding plurality of distinct accumulation functions. Security risk can be assessed according to a risk assessment function that is cumulative of the plurality of taint indicators.

    Abstract translation: 适用于处理安全风险的计算设备中可操作的方法可以使用污染累积来检测入侵。 该方法可以包括:在不同时间从多个不同的源接收指示潜在安全风险的多个污点指示符,并且使用相应的多个不同的累积函数独立地累积多个污染指示符。 安全风险可以根据累积多个污点指标的风险评估功能进行评估。

Patent Agency Ranking