发明名称 Security attributes of nodes in trusted computing systems
摘要 A system and method for resolving a rule conflict within a security policy applied to a trusted computing platform, wherein the fileset to which each of the conflicting rules v and s refers (or "scope") is determined (step 10). It is then determined (at step 12) if the scope of one of the rules s is a complete subset of the scope of rule r. If so, rule s is applied to the accessed file f (at step 14). If not, the conflict is resolved in another way, for example, by determining the most restrictive of rules r and s (at step 16) and applying the result accordingly (step 18).
申请公布号 GB2399903(A) 申请公布日期 2004.09.29
申请号 GB20030007190 申请日期 2003.03.28
申请人 * HEWLETT-PACKARD DEVELOPMENT COMPANY L.P. 发明人 MICHAEL JOHN * WRAY
分类号 G06F21/24;G06F12/00;G06F21/00;(IPC1-7):G06F1/00 主分类号 G06F21/24
代理机构 代理人
主权项
地址