DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Role-based access control permissions

Abstract

Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

Inventors:
; ; ;
Issue Date:
Research Org.:
Honeywell International Inc. Morris Plains, NJ (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1353057
Patent Number(s):
9635029
Application Number:
13/682,428
Assignee:
Honeywell International Inc.
Patent Classifications (CPCs):
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
DOE Contract Number:  
OE0000544
Resource Type:
Patent
Resource Relation:
Patent File Date: 2012 Nov 20
Country of Publication:
United States
Language:
English
Subject:
99 GENERAL AND MISCELLANEOUS; 42 ENGINEERING; 97 MATHEMATICS AND COMPUTING

Citation Formats

Staggs, Kevin P., Markham, Thomas R., Hull Roskos, Julie J., and Chernoguzov, Alexander. Role-based access control permissions. United States: N. p., 2017. Web.
Staggs, Kevin P., Markham, Thomas R., Hull Roskos, Julie J., & Chernoguzov, Alexander. Role-based access control permissions. United States.
Staggs, Kevin P., Markham, Thomas R., Hull Roskos, Julie J., and Chernoguzov, Alexander. Tue . "Role-based access control permissions". United States. https://www.osti.gov/servlets/purl/1353057.
@article{osti_1353057,
title = {Role-based access control permissions},
author = {Staggs, Kevin P. and Markham, Thomas R. and Hull Roskos, Julie J. and Chernoguzov, Alexander},
abstractNote = {Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Apr 25 00:00:00 EDT 2017},
month = {Tue Apr 25 00:00:00 EDT 2017}
}

Works referenced in this record:

Method and system for verification of an endpoint security scan
patent, September 2011


A context-related authorization and access control method based on RBAC:
conference, June 2002

  • Wilikens, Marc; Feriti, Simone; Sanna, Alberto
  • SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies, p. 117-124
  • https://doi.org/10.1145/507711.507730