The present patent application claims priority from the provisional applications No. 60/093,542, Schneider, et al., Distributed Network Security, filed Mar. 10, 1997, and No. 60/040,262, Schneider, et al., Secure Electronic Network Delivery, also filed Mar. 10, 1997. The present patent application is further one of four patent applications that have the same Detailed Description and assignee as the present patent application and are being filed on the same date. The four applications are: U.S. Ser. No. 09/034,507, David Schneider, et al., Distributed administration of access to information; U.S. Ser. No. 09/034,503, David Schneider, et al., User interface for accessing information, now abandoned; U.S. Ser. No. 09/034,576, David Schneider, et al., Secure delivery of information in a network, issued Jan. 23, 2001 as U.S. Pat. No. 6,178,505; and U.S. Ser. No. 09/034,587, David Schneider, et al., Scalable access filter, issued Aug. 15, 2000 as U.S. Pat. No. 6,105,027, David Schneider, et al., Techniques for eliminating redundant access checking by access filters.
Number | Name | Date | Kind |
---|---|---|---|
4956769 | Smith | Sep 1990 | A |
5012405 | Nishikado et al. | Apr 1991 | A |
5263157 | Janis | Nov 1993 | A |
5263158 | Janis | Nov 1993 | A |
5263165 | Janis | Nov 1993 | A |
5652787 | O'Kelly | Jul 1997 | A |
5720033 | Deo | Feb 1998 | A |
5787427 | Benantar et al. | Jul 1998 | A |
5787428 | Hart | Jul 1998 | A |
5796951 | Hamner et al. | Aug 1998 | A |
5826010 | Joseph et al. | Oct 1998 | A |
5835726 | Shwed et al. | Nov 1998 | A |
5859978 | Sonderegger et al. | Jan 1999 | A |
5862325 | Reed et al. | Jan 1999 | A |
5898830 | Wesinger, Jr. et al. | Apr 1999 | A |
5931917 | Nguyen et al. | Aug 1999 | A |
5941947 | Brown et al. | Aug 1999 | A |
5991807 | Schmidt et al. | Nov 1999 | A |
6085191 | Fisher et al. | Jul 2000 | A |
6105027 | Schneider et al. | Aug 2000 | A |
6178505 | Schneider et al. | Jan 2001 | B1 |
6253251 | Benantar et al. | Jun 2001 | B1 |
Number | Date | Country |
---|---|---|
WO 96 05549 | Feb 1996 | WO |
Entry |
---|
Computer Dictionary, 2d ed., Microsoft Press, Redmond, Washington, p. 215, Oct. 1993.* |
Edwards, K., “Policies and Roles in Collaborative Applications,” Proc. of the ACM 1996 Conf. on Computer Supported Cooperative Work, pp. 11-20, Nov. 1996.* |
Lampson, B., et al., “Authentication in Distributed Systems: Theory and Practice,” Proc. of the 13th ACM Symp. on Operating Systems Principles, pp. 165-182, Oct. 1991.* |
Gladney, H., “Access Control for Large Collections,” ACM Trans. on Information Systems, vol. 15, No. 2, pp. 154-194, Apr. 1997.* |
Shen, H., et al., “Access Control for Collaborative Environments,” Conf. Proc. on Computer-Supported Collaborative Work, ACM, pp. 51-58, Nov. 1992.* |
Reiter, M., et al., “Integrating Security in a Group Oriented Distributed System,” Proc. of Research in Security & Privacy, 1992, IEEE, pp. 18-32, May 1992.* |
Toy, M., “AT&T's Electronic Mail Service for Government Users—FTS2000MAIL,” Globecom '92, IEEE, vol. 2, pp. 950-957, Dec. 1992.* |
Che-fun Yu, Access control and authorization plan for customer control of network services, in: IEEE Global Telecommunications Conference and exhibition, Conference Record, vol. 2, pp. 862-869. |
PCT/US98/04522, Partial international search, with indications of relevance of the references cited above. (PCT/US98/04522 has the same Specification as the application in which this IDS is being filed). |
CheckPoint FireWall-1™ White Paper, Version 2.0—Jun. 1995. http://www.integralis.co.uk/checkpnt/firewall/white. |
Checkpoint FireWall-1, http://www.metadigm.co.uk/fwl/. 1996 Metadigm Ltd. |
Commercial Firewalls and Related FW Products, http://hp735c.csc.cuhk.hk/firewall.html. Mar. 23, 1996. |
Five Domains of Network Security, Technical Overview of the Eagle, http://www.raptor.com/ . . . T22NZ.Z56DAM.BF3AQD.F2. |
Firewalls and Security Related Information, http://www.nacisa.nato.int/FWVENDOR.HTM. |
Number | Date | Country | |
---|---|---|---|
60/039542 | Mar 1997 | US | |
60/040262 | Mar 1997 | US |