Risk Adaptive Information Flow Based Access Control

Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized,...

Full description

Saved in:
Bibliographic Details
Main Authors RAO JOSYULA R, ROHATGI PANKAJ, CHENG PAUN, KESER CLAUDIA
Format Patent
LanguageEnglish
Published 14.07.2011
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, request/response or free market mechanism. As requested from subjects within the organization for access to objects, i.e. information and data, are received, the amount of risk or risk level associated with each requested is quantified. Risk quantification can be accomplished using, for example, fuzzy multi-level security. The quantified risk associated with the access request in combination with the identity of the object and the identity of the subject are used to determine whether or not the request should be granted, denied or granted with appropriated mitigation measures.
AbstractList Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, request/response or free market mechanism. As requested from subjects within the organization for access to objects, i.e. information and data, are received, the amount of risk or risk level associated with each requested is quantified. Risk quantification can be accomplished using, for example, fuzzy multi-level security. The quantified risk associated with the access request in combination with the identity of the object and the identity of the subject are used to determine whether or not the request should be granted, denied or granted with appropriated mitigation measures.
Author KESER CLAUDIA
ROHATGI PANKAJ
CHENG PAUN
RAO JOSYULA R
Author_xml – fullname: RAO JOSYULA R
– fullname: ROHATGI PANKAJ
– fullname: CHENG PAUN
– fullname: KESER CLAUDIA
BookMark eNrjYmDJy89L5WQwDsoszlZwTEksKMksS1XwzEvLL8pNLMnMz1Nwy8kvV3BKLE5NUXBMTk4tLlZwzs8rKcrP4WFgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgaGhobmxgYWJo6GxsSpAgBq7C55
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
ExternalDocumentID US2011173084A1
GroupedDBID EVB
ID FETCH-epo_espacenet_US2011173084A13
IEDL.DBID EVB
IngestDate Fri Jul 19 15:30:30 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_US2011173084A13
Notes Application Number: US20070623838
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20110714&DB=EPODOC&CC=US&NR=2011173084A1
ParticipantIDs epo_espacenet_US2011173084A1
PublicationCentury 2000
PublicationDate 20110714
PublicationDateYYYYMMDD 2011-07-14
PublicationDate_xml – month: 07
  year: 2011
  text: 20110714
  day: 14
PublicationDecade 2010
PublicationYear 2011
Score 2.805119
Snippet Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
Title Risk Adaptive Information Flow Based Access Control
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20110714&DB=EPODOC&locale=&CC=US&NR=2011173084A1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1ZS8NAEB5KPd80Kh5VFpS8LRpzNH0IkpMi2Ja2kb6VJJtAsSTBRPr3nd0m2qe-7sAye8yxs_PNADwxU8XDZK800o2Manqs0EGsmxRdeyPJjJQHz3i2xcgYhtr7Ql90YN1iYUSd0I0ojogSlaC810Jfl_9BLE_kVlbP8QqHirdgbnkya8N9HI8je47lT8be2JVd1wpn8mgqaAreZlOz8a10wB1pXmnf_3Q4LqXcNSrBGRxOcL68PodOmktw4ra91yQ4_mi-vCU4EjmaSYWDjRxWF6BOV9UXsVlUcm1FGkwRZ5sE62JDHLRNjNiiGSJxt9nol_AY-HN3SJGP5d-yl-Fsl2n1Crp5kafXQLQo6puJYrykSaaxKONFqzhglKHrFRlscAO9fTPd7iffwek2btqnitaDbv39k96j4a3jB7Ffv1cBhQg
link.rule.ids 230,309,786,891,25594,76906
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8JAEJ4QfOBNUeMDdRNNb42Wbks5EFNaGlQohIfh1rTdNiGStrE1_H1nl6KcuO4km9nHPHZ2vhmAJ2aoeJisKfuaHstUCxS5HWiGjK69HsZ6xINnPNvC1ftz-r7QFhVYbbEwok7oWhRHRIkKUd4Loa-z_yCWLXIr8-dgiUPpqzPr2BLbhvs4Hkeyu53eeGSPLMmyOvOp5E4ETcHbbFAT30oHLV6flztPn12OS8l2jYpzCodjnC8pzqASJXWoWdvea3U4HpZf3nU4EjmaYY6DpRzm56BOlvkXMZmfcW1FSkwRZ5s4q3RNumibGDFFM0RibbLRL-DR6c2svox8eH_L9ubTXabVS6gmaRJdAaG-3zJCRX-JwpgyP-ZFqzhglKHr5eusfQ2NfTPd7Cc_QK0_Gw68wZv7cQsnmxhqS1ZoA6rF9090h0a4CO7F3v0CuGCH9Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Risk+Adaptive+Information+Flow+Based+Access+Control&rft.inventor=RAO+JOSYULA+R&rft.inventor=ROHATGI+PANKAJ&rft.inventor=CHENG+PAUN&rft.inventor=KESER+CLAUDIA&rft.date=2011-07-14&rft.externalDBID=A1&rft.externalDocID=US2011173084A1