Security and permission architecture

作者: Neil Shipp , David Hetherington , Gavin Ackroyd , Jiahui Wang , Anand Menon

DOI:

关键词:

摘要: When a user inputs an action request, such as requested command, to be performed on target machine, management system receives the request and verifies it with separate authentication permission system. The verified command is sent machine. An worker machine accesses set of policies, local identify least privileged execution environment in which can performed. launches within identified

参考文章(16)
Aric LeDell, Carolyn Duby, Mark B. King, Michael Vincent, Elchanan Oren, System and Method for As Needed Connection Escalation ,(2013)
Takeyoshi Nitta, Minoru Nitta, Tube for a heat exchanger ,(2009)
Joseph Dunnick, Thomas Depasquale, Valery Gorodnichev, Bruce Elliott, Michael Lore, Jeannine Armstrong, Andrew Csontos, Michael Fredericks, Jonathan Altman, John Love, Thomas Jones, Bret Harris, Gary Mendel, John Luecker, System and method for managing booking and expensing of travel products and services ,(2002)
Erik Carlin, Paul Voccio, Vishvananda Ishaya, Method and System for Identity-Based Authentication of Virtual Machines ,(2015)
Oleg Ananiev, Asaf Kariv, Eugene (John) Neystadt, Daniel Kershaw, Eli Tovbeyn, Flexible end-point compliance and strong authentication for distributed hybrid enterprises ,(2010)
Paul C. Sutton, Thomas G. Phillips, Gang Wang, Administrative security systems and methods ,(2005)
Aravind Ramarathinam, Srivatsan Parthasarathy, Michael Michael, Remote access to hosted virtual machines by enterprise users ,(2010)
Peter T. Brundrett, Liqiang Zhu, Paul J. Leach, Scott A. Field, Privilege restriction enforcement in a distributed system ,(2006)