-
1.
公开(公告)号:US09189649B2
公开(公告)日:2015-11-17
申请号:US12823200
申请日:2010-06-25
申请人: Paula K Austel , Suresh Chari , Francisco Curbera , Matthew J. Duftler , Rania Y. Khalaf , Florian F. Rosenberg
发明人: Paula K Austel , Suresh Chari , Francisco Curbera , Matthew J. Duftler , Rania Y. Khalaf , Florian F. Rosenberg
IPC分类号: H04L29/06 , G06F7/04 , G06F15/16 , G06F17/30 , G06F21/62 , G06F21/33 , G06F9/44 , G06Q10/06 , G06Q10/10 , H04L12/24 , H04L29/08
CPC分类号: G06F21/6236 , G06F8/10 , G06F8/34 , G06F21/33 , G06F2221/2115 , G06Q10/06 , G06Q10/06316 , G06Q10/10 , H04L41/046 , H04L67/10
摘要: A method, system and computer program product for security model for workflows aggregating third party secure services. In one embodiment, a workflow model described in a workflow language is provided and configured to declare security requirements of a composite application integrating protected data from two or more external network resources. The method also incorporates providing an authentication service executing on at least one secure server computer. The authentication service is configured to conduct user authentication and authorization to access the protected data at the external network resources on behalf of the composite application executing on at least one host server computer according to the workflow language.
摘要翻译: 一种用于聚合第三方安全服务的工作流安全模型的方法,系统和计算机程序产品。 在一个实施例中,以工作流程语言描述的工作流模型被提供并配置为声明组合应用程序的安全性要求,该组合应用程序将来自两个或多个外部网络资源的受保护数据集成。 该方法还包括提供在至少一个安全服务器计算机上执行的认证服务。 认证服务被配置为进行用户认证和授权以代表根据工作流程语言在至少一个主机服务器计算机上执行的复合应用程序访问外部网络资源上的受保护数据。
-
公开(公告)号:US20050257269A1
公开(公告)日:2005-11-17
申请号:US11121359
申请日:2005-05-03
申请人: Suresh Chari , Pau-Chen Cheng , Pankaj Rohatgi , Charanjit Jutla , Josyula Rao , Michael Steiner
发明人: Suresh Chari , Pau-Chen Cheng , Pankaj Rohatgi , Charanjit Jutla , Josyula Rao , Michael Steiner
CPC分类号: H04L63/1416 , H04L63/145
摘要: A response system which produces strategies to contain hosts compromised by a worm. One minimizes the damage so caused and the loss of business values induced by actions taken to protect a network. The approach uses logical representation of the target network. By abstracting low level information such as switches, routers and their connectivities, theoretical algorithms are used to find the optimal containment.
摘要翻译: 一种响应系统,其产生策略以包含受蠕虫感染的主机。 一个最小化由此引起的损害,以及为保护网络而采取的行动引起的业务价值的损失。 该方法使用目标网络的逻辑表示。 通过抽象交换机,路由器及其连通性等低级别信息,可以使用理论算法来找到最优的遏制。
-
3.
公开(公告)号:US20110321131A1
公开(公告)日:2011-12-29
申请号:US12823200
申请日:2010-06-25
申请人: Paula K. Austel , Suresh Chari , Francisco Curbera , Matthew J. Duftler , Rania Y. Khalaf , Florian F. Rosenberg
发明人: Paula K. Austel , Suresh Chari , Francisco Curbera , Matthew J. Duftler , Rania Y. Khalaf , Florian F. Rosenberg
IPC分类号: G06F21/20
CPC分类号: G06F21/6236 , G06F8/10 , G06F8/34 , G06F21/33 , G06F2221/2115 , G06Q10/06 , G06Q10/06316 , G06Q10/10 , H04L41/046 , H04L67/10
摘要: A method, system and computer program product for security model for workflows aggregating third party secure services. In one embodiment, a workflow model described in a workflow language is provided and configured to declare security requirements of a composite application integrating protected data from two or more external network resources. The method also incorporates providing an authentication service executing on at least one secure server computer. The authentication service is configured to conduct user authentication and authorization to access the protected data at the external network resources on behalf of the composite application executing on at least one host server computer according to the workflow language.
摘要翻译: 一种用于聚合第三方安全服务的工作流安全模型的方法,系统和计算机程序产品。 在一个实施例中,以工作流程语言描述的工作流模型被提供并配置为声明组合应用程序的安全性要求,该组合应用程序将来自两个或多个外部网络资源的受保护数据集成。 该方法还包括提供在至少一个安全服务器计算机上执行的认证服务。 认证服务被配置为进行用户认证和授权以代表根据工作流程语言在至少一个主机服务器计算机上执行的复合应用程序访问外部网络资源上的受保护数据。
-
公开(公告)号:US20060161982A1
公开(公告)日:2006-07-20
申请号:US11037695
申请日:2005-01-18
申请人: Suresh Chari , Pau-Chen Cheng , Josyula Rao , Pankaj Rohatgi , Michael Steiner
发明人: Suresh Chari , Pau-Chen Cheng , Josyula Rao , Pankaj Rohatgi , Michael Steiner
IPC分类号: G06F12/14
CPC分类号: G06F21/554 , G06F21/53
摘要: An intrusion detection system (IDS), method of protecting computers against intrusions and program product therefor. The IDS determines which applications are to run in native environment (NE) and places the remaining applications in a sandbox. Some of the applications in sandboxes may be placed in a personalized virtual environment (PVE) in the sandbox. Upon detecting an attempted attack, a dynamic honeypot may be started for an application in a sandbox and not in a PVE. A virtualized copy of system resources may be created for each application in a sandbox and provided to the corresponding application in the respective sandbox.
摘要翻译: 入侵检测系统(IDS),防止计算机入侵的方法和程序产品。 IDS确定在本地环境(NE)中运行哪些应用程序,并将剩余的应用程序放在沙箱中。 砂箱中的一些应用程序可能会放置在沙箱中的个性化虚拟环境(PVE)中。 在检测到尝试的攻击时,可以为沙箱而不是PVE中的应用启动动态蜜罐。 可以为沙箱中的每个应用程序创建系统资源的虚拟副本,并提供给相应沙箱中的相应应用程序。
-
5.
公开(公告)号:US20060104443A1
公开(公告)日:2006-05-18
申请号:US10987640
申请日:2004-11-12
申请人: Suresh Chari , Vincenzo Diluoffo , Paul Karger , Elaine Palmer , Tal Rabin , Josyula Rao , Pankaj Rohatgi , Helmut Scherzer , Michael Steiner , David Toll
发明人: Suresh Chari , Vincenzo Diluoffo , Paul Karger , Elaine Palmer , Tal Rabin , Josyula Rao , Pankaj Rohatgi , Helmut Scherzer , Michael Steiner , David Toll
IPC分类号: H04L9/00
CPC分类号: G06F7/582 , H04L9/003 , H04L9/0662
摘要: A random number generator (RNG) resistant to side channel attacks includes an activation pseudo random number generator (APRNG) having an activation output connected to an activation seed input to provide a next seed to the activation seed input. A second random number generator includes a second seed input, which receives the next seed and a random data output, which outputs random data in accordance with the next seed. An input seed memory is connected to the activation seed input and a feedback connection from the activation output so that the next seed is stored in the input seed memory to be used by the APRNG as the activation seed input at a next startup cycle.
-
-
-
-