发明名称 Method and system for risk-adaptive access control of an application action
摘要 Risk-adaptive access control techniques are disclosed. In various embodiments, a value for a threat level attribute is determined based at least in part on threat detection data generated by a security system or process. The determined value for the threat level attribute is used to make, at least in part, an access control decision with respect to a request to access the resource. In various embodiments, the threat level attribute is used as an environment attribute provided as input to an XACML-based access control system.
申请公布号 US9240996(B1) 申请公布日期 2016.01.19
申请号 US201313852865 申请日期 2013.03.28
申请人 EMC Corporation 发明人 Sinnema Rémon
分类号 G06F7/04;H04L29/06 主分类号 G06F7/04
代理机构 Van Pelt, Yi & James LLP 代理人 Van Pelt, Yi & James LLP
主权项 1. A method of controlling access to a resource, comprising: setting one or more security policies for controlling access to the resource of an application, wherein the one or more security policies associate each of a plurality of access levels with a corresponding value for a threat level attribute; receiving at an access control server, threat detection data from a security system or process via a communication interface, wherein the security system or process monitors network traffic received at a firewall; determining, by a processor, based at least in part on the threat detection data received from the security system or process, a value for the threat level attribute, wherein the value for the threat level attribute is determined at least in part by performing a computation on the threat detection data and is determined based at least in part on comparing a degree to which recently observed behavior deviates from a baseline of normal behavior, wherein the normal behavior observed in a prior learning period; receiving from the application, an access request that identifies a user of a client terminal, the resource of the application subject to the access request, and one or more actions requested associated with the resource of the application in response to the client terminal attempting to perform one or more actions with respect to the resource of the application over the communication network; and determining, by the access control server, an access level of the plurality of access levels to apply to the resource of the application in response to receiving a request from the client terminal to access the resource over a communication network, wherein the access level is determined based at least in part on the determined value for the threat level attribute, the identity of the user, the resource of the application subject to the request, the one or more actions requested associated with the resource of the application, and at least one of the one or more security policies.
地址 Hopkinton MA US