-
公开(公告)号:US20220224722A1
公开(公告)日:2022-07-14
申请号:US17148684
申请日:2021-01-14
Applicant: International Business Machines Corporation
Inventor: Sheng Yan Sun , Shuo Li , Xiaobo Wang , Jun Wang , Hua Wang , Shidong Shan , Xing Xing Jing
Abstract: A method, system, and computer program product for recommending an initial database security model. The method may include identifying a plurality of nodes connected to a security network. The method may also include analyzing security characteristics of each node of the plurality of nodes. The method may also include identifying, from the security characteristics, key factors for each node. The method may also include calculating similarities between each node of the plurality of nodes. The method may also include building a self-organized centerless network across the plurality of nodes by grouping nodes with high similarities based on the similarities between each node, where the self-organized centerless network is a centerless network without a central management server, and includes groups of nodes from the plurality of nodes. The method may also include generating federated security models for the groups of nodes.
-
公开(公告)号:US12003542B2
公开(公告)日:2024-06-04
申请号:US17148684
申请日:2021-01-14
Applicant: International Business Machines Corporation
Inventor: Sheng Yan Sun , Shuo Li , Xiaobo Wang , Jun Wang , Hua Wang , Shidong Shan , Xing Xing Jing
IPC: H04L9/40 , G06F18/22 , G06F18/2413 , G06N20/00
CPC classification number: H04L63/20 , G06F18/22 , G06F18/24143 , G06N20/00 , H04L63/102
Abstract: A method, system, and computer program product for recommending an initial database security model. The method may include identifying a plurality of nodes connected to a security network. The method may also include analyzing security characteristics of each node of the plurality of nodes. The method may also include identifying, from the security characteristics, key factors for each node. The method may also include calculating similarities between each node of the plurality of nodes. The method may also include building a self-organized centerless network across the plurality of nodes by grouping nodes with high similarities based on the similarities between each node, where the self-organized centerless network is a centerless network without a central management server, and includes groups of nodes from the plurality of nodes. The method may also include generating federated security models for the groups of nodes.
-
公开(公告)号:US11722576B2
公开(公告)日:2023-08-08
申请号:US16188708
申请日:2018-11-13
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Si Bin Fan , Wu Song Fang , Xing Xing Jing , Xiao Ying Zhou , Bin Xiong , Ting Chen
IPC: H04L67/306 , G06Q50/00
CPC classification number: H04L67/306 , G06Q50/01
Abstract: A first content and a second content of a first user are obtained. The second content is configured by the first user to be displayed to a second user instead of the first content. A familiarity degree between the first user and the second user are determined. A third content is generated based on the first content, the second content, and the familiarity degree. The third content is displayed to the second user.
-
公开(公告)号:US12141313B2
公开(公告)日:2024-11-12
申请号:US16991182
申请日:2020-08-12
Applicant: International Business Machines Corporation
Inventor: Shuo Li , Xiaobo Wang , Sheng Yan Sun , Xing Xing Jing
IPC: H04L29/06 , G06F16/2453 , G06F16/2455 , G06F21/62
Abstract: A computer-implemented method to inject security semantics into database queries. The method includes receiving, by a database system, a query, wherein the query is received from a host and the query is generated by a first user account. The method also includes, generating an access plan for the query. The method further includes, determining a first portion of the access plan matches a first security syntax. The method includes, injecting, in response to determining the first portion of the access plan matches the first security syntax, the first security syntax into the access plan. The method further includes, executing the query. The method includes, returning a set of results of the query to the host.
-
公开(公告)号:US20200073628A1
公开(公告)日:2020-03-05
申请号:US16116200
申请日:2018-08-29
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Wu Song Fang , Si Bin Fan , Ting Chen , Xing Xing Jing , Xiao Ying Zhou , Bin Xiong
Abstract: A method, a device and a computer program product for content collaboration are proposed. One or more computer processors determine voice identification information of a first user based on a voice input from the first user. The one or more computer processors determine a focus for the first user based on the voice identification information, the focus for the first user associated with first content appearing on a screen of the first user. The one or more computer processors set a focus for a second user to be same as the focus for the first user, the focus for the second user associated with second content displayed on a screen of the second user.
-
-
-
-