Proactive information security management
    1.
    发明授权
    Proactive information security management 有权
    主动信息安全管理

    公开(公告)号:US08285748B2

    公开(公告)日:2012-10-09

    申请号:US12472016

    申请日:2009-05-26

    IPC分类号: G06F17/30

    摘要: A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling access to sensitive information, the method comprising: maintaining access constraint data that can be used to control access to the sensitive information, wherein the access constraint data includes match pattern data and apply pattern data; receiving a semantic query from a querier requesting access to the sensitive information; based on the match pattern data, determining whether the semantic query should be constrained according to the apply pattern data; where said semantic query should be constrained according to the apply pattern data, rewriting the semantic query according to the apply pattern data to produce a rewritten query; executing the rewritten query against a database that contains the sensitive information; and returning any results of executing the rewritten query.

    摘要翻译: 描述了用于主动信息安全管理的方法和装置。 在一个实施例中,例如,一种用于控制对敏感信息的访问的计算机实现的方法,所述方法包括:维护可用于控制对敏感信息的访问的访问约束数据,其中访问约束数据包括匹配模式数据并应用 模式数据; 从查询器接收请求访问敏感信息的语义查询; 基于匹配模式数据,确定是否应该根据应用模式数据约束语义查询; 其中所述语义查询应根据应用模式数据进行约束,根据应用模式数据重写语义查询以产生重写查询; 对包含敏感信息的数据库执行重写的查询; 并返回执行重写查询的任何结果。

    Proactive Information Security Management
    2.
    发明申请
    Proactive Information Security Management 有权
    主动信息安全管理

    公开(公告)号:US20090300002A1

    公开(公告)日:2009-12-03

    申请号:US12472016

    申请日:2009-05-26

    IPC分类号: G06F17/30

    摘要: A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling access to sensitive information, the method comprising: maintaining access constraint data that can be used to control access to the sensitive information, wherein the access constraint data includes match pattern data and apply pattern data; receiving a semantic query from a querier requesting access to the sensitive information; based on the match pattern data, determining whether the semantic query should be constrained according to the apply pattern data; where said semantic query should be constrained according to the apply pattern data, rewriting the semantic query according to the apply pattern data to produce a rewritten query; executing the rewritten query against a database that contains the sensitive information; and returning any results of executing the rewritten query.

    摘要翻译: 描述了用于主动信息安全管理的方法和装置。 在一个实施例中,例如,一种用于控制对敏感信息的访问的计算机实现的方法,所述方法包括:维护可用于控制对敏感信息的访问的访问约束数据,其中访问约束数据包括匹配模式数据并应用 模式数据; 从查询器接收请求访问敏感信息的语义查询; 基于匹配模式数据,确定是否应该根据应用模式数据约束语义查询; 其中所述语义查询应根据应用模式数据进行约束,根据应用模式数据重写语义查询以产生重写查询; 对包含敏感信息的数据库执行重写的查询; 并返回执行重写查询的任何结果。