Claims
- 1. A method of controlling access of at least first and second computer programs to system resources of a data processing system, the first and second computer programs having respective first security control definitions that govern access to the system resources; the method comprising the steps of:
providing a second set of security qualifiers comprising at least one second security qualifier applicable jointly to at least both of the first and second computer programs; and providing a second security control definition corresponding to the at least one second security qualifier, the second security control definition being arranged, in use, to influence jointly the access by the first and second computer programs to the system resources.
- 2. A method as claimed in claim 1 in which first and second security definitions represent a security hierarchy in which the second security definition prevails over the first security definitions such that access to system resources is controlled by the second security definition in the absence of invoking the first security definitions.
- 3. A method as claimed in claim 1, further comprising the step of invoking the second security control definition to control access of the both the first and second computer programs to system resources.
- 4. A method as claimed in claim 1, further comprising the step of changing the access to the system resources of at least one of the first and second computer programs by invoking a respective one of the first security control definitions subsequent to a step of invoking the second security control definition.
- 5. A method as claimed in claim 1 in which the at least one first security definitions is arranged such that an associated security operation of the first security definition is either enabled or disabled in relation to a first identifiable system resource.
- 6. A method as claimed in claim 1 in which the second security definition is arranged such that an associated security operation of the second security definition is either enabled or disabled in relation to a second identifiable system resource.
- 7. A method as claimed in claim 6 in which the second identifiable system resource is commonly accessible by both the first and second computer programs.
- 8. A method as claimed in any preceding claim in which the systems resources comprise at least one of data structures stored in memory, a storage device, a communication device, data, files, data base records or a further computer program.
- 9. A data processing system for controlling access of at least first and second computer programs to system resources of a data processing system, the first and second computer programs having respective first security control definitions that govern access to the system resources; the system comprising:
means for providing a second set of security qualifiers comprising at least one second security qualifier applicable jointly to at least both of the first and second computer programs; and means for providing a second security control definition corresponding to the at least one second security qualifier, the second security control definition being arranged, in use, to influence jointly the access by the first and second computer programs to the system resources.
- 10. A system as claimed in claim 9 in which first and second security definitions represent a security hierarchy in which the second security definition prevails over the first security control definitions such that access to system resources is controlled by the second security definition in the absence of invoking the first security control definitions.
- 11. A system as claimed in claim 9, further comprising means for invoking the second security control definition to control access of the both the first and second computer programs to system resources.
- 12. A system as claimed in claim 9, further comprising means for changing the access to the system resources of at least one of the first and second computer programs by invoking a respective one of the first security control definitions subsequent to the step of invoking the second security control definition.
- 13. A system as claimed in claim 9 in which the at least one first security definitions is arranged such that an associated security operation of the first security definition is either enabled or disabled in relation to a first identifiable system resource.
- 14. A system as claimed in claim 9 in which the at least one of the second security definitions is arranged such that an associated security operation of the second security definition is either enabled or disabled in relation to a second identifiable system resource.
- 15. A system as claimed in claim 14 in which the second identifiable system resource is commonly accessible by both the first and second computer programs.
- 16. A system as claimed in claim 15 in which the systems resources comprise at least one of data structures stored in memory, a storage device, a communication device, data, files, data base records or a further computer program.
- 17. A computer program product for controlling access of at least first and second computer programs to system resources of a data processing system, the first and second computer programs having respective first security control definitions that govern access to the system resources; the computer program product comprising a storage medium having stored thereon:
computer program code means for providing a second set of security qualifiers comprising at least one second security qualifier applicable jointly to at least both of the first and second computer programs; and computer program code means for providing a second security control definition corresponding to the at least one second security qualifier, the second security control definition being arranged, in use, to influence jointly the access by the first and second computer programs to the system resources.
- 18. A computer program product as claimed in claim 17 in which first and second security definitions represent a security hierarchy in which the second security control definition prevails over the first security definitions such that access to system resources is controlled by the second security control definition in the absence of invoking the first security control definitions.
- 19. A computer program product as claimed in claim 17, further comprising computer program code means for invoking the second security control definition to control access of both the first and second computer programs to system resources.
- 20. A computer program product as claimed in claim 17, further comprising computer program code means for changing the access to the system resources of at least one of the first and second computer programs by invoking a respective one of the first security control definitions subsequent to the step of invoking the second security control definition.
- 21. A computer program product as claimed in claim 17 in which at least one first security control definitions is arranged such that an associated security operation of the first security control definition is either enabled or disabled in relation to a first identifiable system resource.
- 22. A computer program product as claimed in claim 17 in which the second security definition is arranged such that an associated security operation of the second security definition is either enabled or disabled in relation to a second identifiable system resource.
- 23. A computer program product as claimed in claim 22 in which the second identifiable system resource is commonly accessible by both the first and second computer programs.
- 24. A computer program product as claimed in claim 17 in which the system resources comprise at least one of data structures stored in memory, a storage device, a communication devices, data, files, data base records or a further computer program.
CROSS REFERENCE TO RELATED APPLICATION
[0001] This application claims priority and all other benefits under 35 U.S.C. §120 of prior filed co-pending U.S. provisional patent application Ser. No. 60/183925, filed Feb. 22, 2000 and is incorporated herein by reference thereto.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60183925 |
Feb 2000 |
US |