发明名称 SECURITY ATTRIBUTES OF NODES IN TRUSTED COMPUTING SYSTEMS
摘要 <P>PROBLEM TO BE SOLVED: To provide a system and method for resolving a rule conflict within a security policy applied to a trusted computing platform. <P>SOLUTION: A file set to which each of conflicting rules v and s refers (or "scope") is determined (step 10). It is then determined (at step 12) if the scope of one of the rules s is a complete subset of the scope of the rule r. If so, the rule s is applied to an accessed file f (at step 14). If not, the conflict is resolved in another way, for example, by determining the most restrictive of rules r and s (at step 16) and applying the result accordingly (step 18). <P>COPYRIGHT: (C)2005,JPO&NCIPI
申请公布号 JP2004303243(A) 申请公布日期 2004.10.28
申请号 JP20040088737 申请日期 2004.03.25
申请人 HEWLETT-PACKARD DEVELOPMENT CO LP 发明人 WRAY MICHAEL JOHN
分类号 G06F12/00;G06F21/57 主分类号 G06F12/00
代理机构 代理人
主权项
地址