发明名称 Method and system for automating security policy definition based on recorded transactions
摘要 Following development of an application, the application is deployed in a pre-production environment. A user role plays against that application, typically by performing one or more operations as a particular user in a particular group. As the operator role plays, access logs are written, and these logs are then analyzed and consolidated into a set of commands that drive a policy generator. The policy generator creates an optimized security policy that it then deploys to one or more enforcement points. In this manner, the framework enables automated configuration and deployment of one or more security policies.
申请公布号 US8640195(B2) 申请公布日期 2014.01.28
申请号 US20090570293 申请日期 2009.09.30
申请人 CHOI CHRISTOPHER YOUNG-SOO;HOCKINGS CHRISTOPHER JOHN;READSHAW NEIL IAN;INTERNATIONAL BUSINESS MACHINES CORPORATION 发明人 CHOI CHRISTOPHER YOUNG-SOO;HOCKINGS CHRISTOPHER JOHN;READSHAW NEIL IAN
分类号 G06F7/04 主分类号 G06F7/04
代理机构 代理人
主权项
地址