摘要:
There is provided an information processing system in which files on plural file servers having different file management manners can be efficiently accessed by a single client program, a control method for the information processing system, and a storage medium for storing programs for performing the control. A gateway program 20 is provided on a first server information processing device 120, and an agent program 30 which is operated in conformity with the gateway program 20 is provided on a second server information processing device 130, whereby a copy of the directory structure of files on the second server information processing device is created on the first server information processing device 120. In addition, at the time when the copy is created, data in a file are not copied, and the data copy is performed only when the file is opened by an application program 8a of a client information processing device 110.
摘要:
A key managing system including information transmitting apparatus which transmits a date and time when secrecy protection is ended to a key controlling apparatus. The key controlling apparatus searches a key control table for an encryption key associated with a decryption key and the date and time. The key controlling apparatus transmits an encryption key from the search to the information transmitting apparatus. The key controlling apparatus discloses a decryption key for the present date and time to an information receiving apparatus in response to a request for a decryption key. The information transmitting apparatus, upon receipt of the encryption key, encrypts information using the encryption key and transmits the encrypted information to the information receiving apparatus. The information receiving apparatus, for the present date and time matching with the date and time, acquires a disclosed decryption key and decrypts the encrypted information by using the decryption key.
摘要:
A key managing system for implementing simultaneous disclosure of information. The invention includes an information transmitting apparatus which transmits a date and time at which secrecy protection of information is ended to a key controlling apparatus. The key controlling apparatus searches a key control table indicating a relation between decryption keys and decryption key disclosure dates & times for an encryption key that forms a pair in conjunction with a decryption key associated with the date & time transmitted by the information transmitting apparatus. The key controlling apparatus then transmits an encryption key found in the search to the information transmitting apparatus. The key controlling apparatus also discloses a decryption key for the present date & time to an information receiving apparatus in response to a request for a decryption key at a present date and time. The information transmitting apparatus, upon receipt of the encryption key, encrypts information by using the encryption key and then transmits the encrypted information to the information receiving apparatus. The date and time, at which secrecy protection of information is ended is appended to the encrypted information. The information receiving apparatus, upon the present date and time becoming coincident with the date and time appended to the received encrypted information, acquires a disclosed decryption key and decrypts the encrypted information by using the decryption key.
摘要:
A method for producing a granular composition including the steps of: stirring and granulating a mixture containing not less than 3 parts by weight and not more than 80 parts by weight of a phenol compound represented by the formula (1): wherein R1 is an alkyl group having 1 to 8 carbon atoms, X is an n-valent alcohol residue having 1 to 18 carbon atoms optionally containing a heteroatom, a cyclic group, or a heteroatom and a cyclic group, and n is an integer of 1 to 4, and not less than 3 parts by weight and less than 20 parts by weight of a binder to obtain a granular agglomerate; and cracking the granular agglomerate at a temperature of not lower than 25° C. and lower than the temperature which is 10° C. lower than the melting point of the binder, through a cracking machine equipped with a separation mechanism capable of recovering a granule having a particle size not more than 5 mm, and a cracking mechanism, to obtain a granule.
摘要:
In a computer system including a plurality of data storage apparatuses and a management computer, a given data storage apparatus, upon receipt of a control request for a local data storage apparatus from a management computer, accesses the hierarchical relation information between the storage areas in the local data storage apparatus and the storage areas of the other data storage apparatuses, and in the case where a storage area in the local data storage apparatus is set to correspond to a level lower than the other data storage apparatuses, transmits an approval request to the other data storage apparatuses. The given data storage apparatus, upon receipt of the approval from the other data storage apparatuses, executes the control request of the management computer.
摘要:
A security system design supporting tool and method are disclosed, in which security requirements (PP) and security specifications (ST) used for designing a product or a system (TOE) based on CC requirements can be prepared efficiently and uniformly even by ordinary designers other than specialists. In a security system design supporting method, registered PPs and past PP/ST generation cases are so structured as to reuse and/or reference as templates, a draft is automatically generated, and the draft thus generated is additionally modified or corrected by partial automatic generation utilizing a database of past generation cases and partial case accumulated in the generation process thereof.
摘要:
An access control system and its method that can prevent access to read or write into a file, no matter what user right the access request source uses to attempt an unauthorized access. This invention uses a policy that access to a specific file is authorized only when it is made by a specific user using a specific program. In addition, the policy is registered in a policy file 200 and the access information hooked by a file I/O hook program 106 is transmitted through an inter-OS communication processor 108 to an access control program 110 for a security OS 104 in order to perform access control according to said policy.
摘要:
A maintenance information coordination system coordinates maintenance-related information held by a user of a machine or held by an independent maintenance service provider company of the machine. Maintenance-related information is held by a provider of the machine. A user machine inference unit of the maintenance information coordination system infers a machine identifier provided by the provider of the machine, which operates in a zone for which maintenance work information has been recorded from a provider machine information storage unit, a user information storage unit and an operation information storage unit. It further infers a mapping relation between the machine identifier assigned by the provider and an identifier of the machine assigned by its user from operation information of the machine and information in a user machine information storage unit, and a maintenance work information storage unit and stores the mapping relation into an integrated maintenance information storage unit.
摘要:
In a computer system including a plurality of data storage apparatuses and a management computer, a given data storage apparatus, upon receipt of a control request for a local data storage apparatus from a management computer, accesses the hierarchical relation information between the storage areas in the local data storage apparatus and the storage areas of the other data storage apparatuses, and in the case where a storage area in the local data storage apparatus is set to correspond to a level lower than the other data storage apparatuses, transmits an approval request to the other data storage apparatuses. The given data storage apparatus, upon receipt of the approval from the other data storage apparatuses, executes the control request of the management computer.