摘要:
To identify a storage medium storing an electronic file, as a location of the electronic file, and to detect a location move of a file stemming from a replacement of a storage medium, a file management system 100 includes a log acquisition unit 110: detecting an event having occurred on a file stored in a storage medium; checking, with a table, pieces of information of logical paths of locations of the file before and after the event; identifying pieces of medium identification information of storage media in which the file is located before and after the event are identified; and then storing the pieces of medium identification information in a terminal log database as location information of the file.
摘要:
An information asset management system in a network environment includes a monitoring program 11 that monitors operation events performed by users and creates terminal logs 12, a terminal log collection program 21 that stores an integrated log 22 created by collecting the terminal logs 12, and a correlation analysis program 31 that analyzes the whereabouts of information assets using the integrated log 22. When the user exports an information asset from the network environment and when the user imports the information asset into the network environment, the monitoring program 11 monitors these export and import events including feature values of the information assets. The correlation analysis program 31 compares a pre-export feature value of each information asset with a post-import feature value of each information asset to determine whether the information assets are identical and reports a list of information assets in the organization.
摘要:
An information asset management system in a network environment includes a monitoring program 11 that monitors operation events performed by users and creates terminal logs 12, a terminal log collection program 21 that stores an integrated log 22 created by collecting the terminal logs 12, and a correlation analysis program 31 that analyzes the whereabouts of information assets using the integrated log 22. When the user exports an information asset from the network environment and when the user imports the information asset into the network environment, the monitoring program 11 monitors these export and import events including feature values of the information assets. The correlation analysis program 31 compares a pre-export feature value of each information asset with a post-import feature value of each information asset to determine whether the information assets are identical and reports a list of information assets in the organization.
摘要:
One embodiment provides a printed matter managing system configured to print a file to which a label in accordance with identifying information of the file is applied and to manage the printed file as a printed matter, comprising: a detection unit configured to detect the label applied to the printed matter in one of reading the printed matter by a computer configured to limit one of using a result from the reading of the printed matter by the computer and physically carrying out the printed matter and the identifying information contained in the detected label.
摘要:
An agent program 141 stores a log file in a storage device 150. By controlling an access to the storage device 150 according to volume management information 153, the storage device 150 prevents the log file from being updated. A manager program 142 communicates with the agent program 141 to collect the log file. On the completion of the log collection, the manager program 142 adds a signature to a log deletion message by use of a security chip 105. Then, the agent program 141 verifies the signature by use of a security chip 104 to judge that a log deletion request is valid. After that, the volume management information 153 which has been used to protect the log file is rewritten so that the protection is removed.
摘要:
The policy setting support tool according to the present invention simplifies the operation required for setting up policies by providing a policy creation unit 102 and a user interface unit 101. The policy creation unit 102 creates a draft policy from a combination of sample policies prepared for each kind of software, association information providing information on the programs that are likely to access a given object, and an access log showing a history of behavior of a given program. A user interface unit 101 displays the draft policy and allows the user to check and revise it. The support tool also facilitates the maintenance of policies, by providing a differential detection unit 104 for detecting items for suggested change referring to the current object 112 and the subject information database 113, for presenting them to the user as through a user interface unit 101, and for allowing the user to revise the policy in simplified operation.
摘要:
A method for producing a granular composition including the steps of: stirring and granulating a mixture containing not less than 3 parts by weight and not more than 80 parts by weight of a phenol compound represented by the formula (1): wherein R1 is an alkyl group having 1 to 8 carbon atoms, X is an n-valent alcohol residue having 1 to 18 carbon atoms optionally containing a heteroatom, a cyclic group, or a heteroatom and a cyclic group, and n is an integer of 1 to 4, and not less than 3 parts by weight and less than 20 parts by weight of a binder to obtain a granular agglomerate; and cracking the granular agglomerate at a temperature of not lower than 25° C. and lower than the temperature which is 10° C. lower than the melting point of the binder, through a cracking machine equipped with a separation mechanism capable of recovering a granule having a particle size not more than 5 mm, and a cracking mechanism, to obtain a granule.
摘要:
In a computer system including a plurality of data storage apparatuses and a management computer, a given data storage apparatus, upon receipt of a control request for a local data storage apparatus from a management computer, accesses the hierarchical relation information between the storage areas in the local data storage apparatus and the storage areas of the other data storage apparatuses, and in the case where a storage area in the local data storage apparatus is set to correspond to a level lower than the other data storage apparatuses, transmits an approval request to the other data storage apparatuses. The given data storage apparatus, upon receipt of the approval from the other data storage apparatuses, executes the control request of the management computer.
摘要:
A security system design supporting tool and method are disclosed, in which security requirements (PP) and security specifications (ST) used for designing a product or a system (TOE) based on CC requirements can be prepared efficiently and uniformly even by ordinary designers other than specialists. In a security system design supporting method, registered PPs and past PP/ST generation cases are so structured as to reuse and/or reference as templates, a draft is automatically generated, and the draft thus generated is additionally modified or corrected by partial automatic generation utilizing a database of past generation cases and partial case accumulated in the generation process thereof.
摘要:
An access control system and its method that can prevent access to read or write into a file, no matter what user right the access request source uses to attempt an unauthorized access. This invention uses a policy that access to a specific file is authorized only when it is made by a specific user using a specific program. In addition, the policy is registered in a policy file 200 and the access information hooked by a file I/O hook program 106 is transmitted through an inter-OS communication processor 108 to an access control program 110 for a security OS 104 in order to perform access control according to said policy.