Abstract:
A system and method for accepting a communication, comprising providing the communication to a controller, associating a model with said communication, determining a state of the model based on said communication, providing a view based on the state of the model, and wherein the view is a page in a page group.
Abstract:
A method for delegating enterprise security capabilities, comprising, providing a capability for a first user, wherein the capability can be expressed as a policy, delegating the capability from the first user to a second user, wherein the second user is allowed to have the capability only at times when the first user is allowed to have the capability, and wherein the delegated capability is propagated in a distributed enterprise security system.
Abstract:
A computer-implemented system and method for policy inheritance, comprising, defining a first group wherein the first group refers to at least one of: a user and a group different from the first group, defining a second group wherein the second group is nested within the first group, defining a first policy wherein the first policy includes a resource, a subject and one of, an action and a role, and wherein the subject includes the first group, inheriting the first policy by the second group, wherein the resource is part of a resource hierarchy, and wherein the first policy can be used to control access to the resource.
Abstract:
A system and method for a software framework for implementing business processes in a web application, comprising a workflow, a control operable to invoke the workflow, and a page group operable to invoke the control.
Abstract:
A system and method for building a representation of a graphical user interface (GUI), comprising generating a class, generating a first representation of the GUI, wherein the class can produce a second representation GUI based on the first representation, generating a second representation of the GUI from the class, wherein the second representation includes at least one control, and wherein the first representation can include at least one of hierarchical relationships among controls, control properties, and control event information.
Abstract:
A system and method distributed enterprise security, comprising, a security control module (SCM) operable to accept information, wherein the information include one or more of: a policy and configuration information at least one security service module (SSM) operable to accept the information from SCM at least one security service providers coupled to the at least one SSM, wherein the at least one security service providers is cable of at least one of, authentication of a user, determining if access to a resource is permitted based on the information, auditing of a security decision, and mapping an authenticated identity to a set of credentials to be used to authenticate a target resource, and wherein the information accepted by the SCM is relevant to one or more of the at least one SSMs.
Abstract:
A system and method for a distributed system for controlling access to a first resource in a hierarchy of resources, comprising, a distributor located on a first server and capable of distributing to a second server a first policy for the first resource, a security service module (SSM) located on the second server and capable of managing based on the first policy conditions for access to at least one of: the first resource and a second resource that is hierarchically inferior to the first resource, and wherein the first policy can be overridden by a second policy wherein the second policy specifies conditions for access for a resource that is hierarchically inferior to the first resource.
Abstract:
A system and method for building a representation of a graphical user interface (GUI), comprising generating a class, generating a first representation of the GUI, wherein the class can produce a second representation GUI based on the first representation, generating a second representation of the GUI from the class, wherein the second representation includes at least one control, and wherein the first representation can include at least one of hierarchical relationships among controls, control properties, and control event information.
Abstract:
A computer-implemented system and method for policy inheritance, comprising, defining a first group wherein the first group refers to at least one of: a user and a group different from the first group, defining a second group wherein the second group is nested within the first group, defining a first policy wherein the first policy includes a resource, a subject and one of, an action and a role, and wherein the subject includes the first group, inheriting the first policy by the second group, wherein the resource is part of a resource hierarchy, and wherein the first policy can be used to control access to the resource.
Abstract:
A system for distributing information from a first process to one or more security service modules. The system comprises a remote interface, capable of accepting first information from the first process, and a provisioning service provider (PSP) coupled to the remote interface. The PSP can obtain the first information from the remote interface, and also can provide second information to a local interface. The second information is based on the first information and is tailored for the one or more security service modules. The local interface can provide the second information to the one or more security service modules and the one or more security service modules can accept the second information and perform at least one of the following: adjust a configuration of the one or more security service modules to reflect the second information, and protect access to at least one resource based on the second information.