-
公开(公告)号:US08285748B2
公开(公告)日:2012-10-09
申请号:US12472016
申请日:2009-05-26
申请人: John S. Thomas , Aravind Yalamanchi , Idriss Mekrez , Matt Topper
发明人: John S. Thomas , Aravind Yalamanchi , Idriss Mekrez , Matt Topper
IPC分类号: G06F17/30
CPC分类号: G06F17/30867 , G06F17/30522 , G06F21/6227
摘要: A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling access to sensitive information, the method comprising: maintaining access constraint data that can be used to control access to the sensitive information, wherein the access constraint data includes match pattern data and apply pattern data; receiving a semantic query from a querier requesting access to the sensitive information; based on the match pattern data, determining whether the semantic query should be constrained according to the apply pattern data; where said semantic query should be constrained according to the apply pattern data, rewriting the semantic query according to the apply pattern data to produce a rewritten query; executing the rewritten query against a database that contains the sensitive information; and returning any results of executing the rewritten query.
摘要翻译: 描述了用于主动信息安全管理的方法和装置。 在一个实施例中,例如,一种用于控制对敏感信息的访问的计算机实现的方法,所述方法包括:维护可用于控制对敏感信息的访问的访问约束数据,其中访问约束数据包括匹配模式数据并应用 模式数据; 从查询器接收请求访问敏感信息的语义查询; 基于匹配模式数据,确定是否应该根据应用模式数据约束语义查询; 其中所述语义查询应根据应用模式数据进行约束,根据应用模式数据重写语义查询以产生重写查询; 对包含敏感信息的数据库执行重写的查询; 并返回执行重写查询的任何结果。
-
公开(公告)号:US20090300002A1
公开(公告)日:2009-12-03
申请号:US12472016
申请日:2009-05-26
申请人: John S. Thomas , Aravind Yalamanchi , Idriss Mekrez , Matt Topper
发明人: John S. Thomas , Aravind Yalamanchi , Idriss Mekrez , Matt Topper
IPC分类号: G06F17/30
CPC分类号: G06F17/30867 , G06F17/30522 , G06F21/6227
摘要: A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling access to sensitive information, the method comprising: maintaining access constraint data that can be used to control access to the sensitive information, wherein the access constraint data includes match pattern data and apply pattern data; receiving a semantic query from a querier requesting access to the sensitive information; based on the match pattern data, determining whether the semantic query should be constrained according to the apply pattern data; where said semantic query should be constrained according to the apply pattern data, rewriting the semantic query according to the apply pattern data to produce a rewritten query; executing the rewritten query against a database that contains the sensitive information; and returning any results of executing the rewritten query.
摘要翻译: 描述了用于主动信息安全管理的方法和装置。 在一个实施例中,例如,一种用于控制对敏感信息的访问的计算机实现的方法,所述方法包括:维护可用于控制对敏感信息的访问的访问约束数据,其中访问约束数据包括匹配模式数据并应用 模式数据; 从查询器接收请求访问敏感信息的语义查询; 基于匹配模式数据,确定是否应该根据应用模式数据约束语义查询; 其中所述语义查询应根据应用模式数据进行约束,根据应用模式数据重写语义查询以产生重写查询; 对包含敏感信息的数据库执行重写的查询; 并返回执行重写查询的任何结果。
-