摘要:
Analyzing a set of policies. A goal comprising a particular outcome is received. An analysis object comprising a data structure maintaining information needed to perform an analysis of the goal is defined. The analysis object is configured to limit a number of calculations needed to achieve the goal. Each member of a set of expressions found in the set of policies has an output. The output is the same for each expression. One of the set of expressions is solved. The solved output is cached in the analysis object such that the solved output is associated with each member of the set of expressions. The analysis object is processed to create a set of values that achieves the goal. Processing includes referencing the cache to retrieve the solved output each time a member of the set of expressions is to be solved during processing of the analysis object.
摘要:
A computer-performed method of examining policies for a target system of an enterprise system domain. The policies are represented as policy rules, each rule including a condition having binary operator expression(s), each expression referring to one or more policy attributes. For a pair of expressions, the computer(s) obtain sets of sample values sufficient to represent all values assumable by the policy attribute(s) referred to in the pair. The sample values are combined in a mixed-radix enumeration in which each attribute is represented in a corresponding position of each sample value combination and of the enumeration. Using the enumeration, the computer(s) evaluate each expression of the pair relative to each of the sample value combinations to obtain a truth table. Based on the truth table, a relationship between the pair is detected and the user may be notified as to an anomaly in the rules.
摘要:
An apparatus to implement role based access control which reduces administrative expenses associated with managing access in accordance with policies and roles. The apparatus includes a memory storing a first role based access control condition associated with an action and a subsystem executing an enforcement entity and a decision entity. In various forms, the two entities are independent entities. The enforcement entity receives a request for the action from a requestor with a role. Additionally, the enforcement entity communicates the role and the request to the decision entity for the decision entity's decision of whether the role satisfies the first condition. The decision entity then communicates the decision to the enforcement entity. Accordingly, the enforcement entity allows or denies the requester the action based on the decision made by the decision entity.
摘要:
A method of implementing requirements applicable to systems of an enterprise includes modeling the requirements as contents of policies applicable to target domains of the enterprise. The policy contents are integrated into a policy model. The policy model is adapted to obtain representations of domain-specific requirements corresponding to target systems in the target domains. The representations are integrated with the corresponding target systems to implement the domain-specific requirements.
摘要:
A method of implementing access control requirements to control access to a plurality of system resources. The requirements are modeled as contents of security policies. The security policy contents are integrated into a policy set. Representations of the integrated policy set are generated, each representation corresponding to a target system that controls access to the resources. The policy set representation(s) are integrated with the corresponding target system(s) to implement the policy set. This method makes it possible to implement high-level security requirements correctly and consistently across systems of a system-of-systems (SoS) and/or distributed system.
摘要:
A computer-performed method of examining policies for a target system of an enterprise system domain. The policies are represented as policy rules, each rule including a condition having binary operator expression(s), each expression referring to one or more policy attributes. For a pair of expressions, the computer(s) obtain sets of sample values sufficient to represent all values assumable by the policy attribute(s) referred to in the pair. The sample values are combined in a mixed-radix enumeration in which each attribute is represented in a corresponding position of each sample value combination and of the enumeration. Using the enumeration, the computer(s) evaluate each expression of the pair relative to each of the sample value combinations to obtain a truth table. Based on the truth table, a relationship between the pair is detected and the user may be notified as to an anomaly in the rules.
摘要:
A method of implementing requirements applicable to systems of an enterprise includes modeling the requirements as contents of policies applicable to target domains of the enterprise. The policy contents are integrated into a policy model. The policy model is adapted to obtain representations of domain-specific requirements corresponding to target systems in the target domains. The representations are integrated with the corresponding target systems to implement the domain-specific requirements.