Rensselaer Polytechnic Institute
Bachelors, Bachelor of Science, Computer Science
Skills:
Linux Unix Java Software Development C Java Enterprise Edition C++ Perl Agile Methodologies Software Engineering Testing Xml Integration Sql Eclipse Virtualization Soa Web Services Requirements Analysis
International Business Machines Corporation - Armonk NY
International Classification:
G06F017/24
US Classification:
715513000
Abstract:
Techniques are disclosed for serializing objects (such as Java™ objects), and deserializing those objects, in a manner that enables contents of the objects to be preserved following changes to definitions of the object structures. Objects are serialized using documents encoded in a markup language (such as Extensible Markup Language, or “XML”). The serialized objects thereby capture class definition information for the class definition which was in effect when the object was serialized. Subsequently, if the class definition is changed, techniques disclosed herein enable deserializing the information from the markup language document to an object that uses the new class definition, without requiring access to a programming language specification of the now-obsolete class definition.
A method for controlling access of a principal to a plurality of resources is disclosed. The method includes organizing each of the plurality of resources such that they are capable of classification by a set of hierarchies. Access permissions are assigned to each role of a set of roles, each role capable of being associated with the principal. Assigning a role of the set of roles to the principal, and associating the role assignment with at least one first resource of the plurality of resources within the first hierarchical structure. The method continues with retrieving the role assigned to the principal, retrieving one or more access permissions for the role, dynamically creating a request permission in response to an attempted action by the principal, comparing the request permission to the access permission, and, in response to determining that the access permission allows the request permission, granting access.
Method And Apparatus For Creating Custom Access Control Hierarchies
David G. Kuehr-McLaren - Apex NC, US Kwabena Mireku - Durham NC, US Govindaraj Sampathkumar - Cary NC, US Janette S. Wong - North York, CA
International Classification:
H04L 9/32 G06F 21/00
US Classification:
726 1, 726 4
Abstract:
The Custom Access Controller adds a custom security hierarchy to the organizational data in the View Processor of WEBSPHERE Virtual Member Manager. Whenever an entity or application attempts to access a resources the access control engine starts the View Processor to identify the organizational data and assigned security policy for the resource. The assigned security policy is applied to a delegated administration path which is part of the delegated administration hierarchy but includes the appropriate path and security policy for the resource. The delegated administration path is sent to an access control engine that grants or denies access to the resource. A View Processor Interface allows network administrators to create and modify custom security hierarchies.
Techniques For Securing Document Content In Print And Electronic Form
Gregory A. Hayes - Coldwater MI, US David G. Kuehr-McLaren - Apex NC, US Ranjan Kumar - Durham NC, US Kwabena Mireku - Durham NC, US Govindaraj Sampathkumar - Cary NC, US
International Classification:
H04N 1/44
US Classification:
380 51
Abstract:
A technique for securing selected document content includes receiving, at a printer, an unsecured electronic document. Selected content of the electronic document is then encrypted, with an encryption key, at the printer. A paper document whose content includes the encrypted selected content of the electronic document is then printed. The encrypted selected content of the paper document is unintelligible prior to decryption with a decryption key.
Using Social Networking Thersholds In Access Control Decisions
David Gerard Kuehr-McLaren - Apex NC, US Ranjan Kumar - Durham NC, US Kwabena Mireku - Durham NC, US Govindaraj Sampathkumar - Cary NC, US
International Classification:
G06F 17/30
US Classification:
707 9, 707E17007
Abstract:
A method, program product and apparatus for controlling access to profile information, multi-media resources or social network functions of a first user by a second user not listed on a friend or group listing of the first user. An application retrieves a threshold criteria for access control and social network statistics in response to an attempted access by an entity without an appropriate privilege. The application compares the statistics to the threshold. Then, if the statistics meet the threshold criteria, the application allows access.
Using Social Networking Thresholds In Access Control Decisions
- Armonk NY, US Ranjan Kumar - Durham NC, US Kwabena A. Mireku - Durham NC, US Govindaraj Sampathkumar - Cary NC, US
International Classification:
H04L 29/06
US Classification:
726 4
Abstract:
A method, program product and apparatus for controlling access to profile information, multi-media resources or social network functions of a first user by a second user not listed on a friend or group listing of the first user. An application retrieves a threshold criteria for access control and social network statistics in response to an attempted access by an entity without an appropriate privilege. The application compares the statistics to the threshold. Then, if the statistics meet the threshold criteria, the application allows access.
Kwabena Mireku's Public Profile on Plaxo. Plaxo helps members like Kwabena Mireku keep in touch with the people who really matter, helping them to connect, keep each other's ...