Abstract:
An access control system is augmented with the ability to categorize access requests as anomalous, by correlating the time and location of the requesting user with information provided by the requesting user's calendar entries. These entries provide the dates and times that a user is anticipated to be located in a particular geographic region.
Abstract:
An information processing system comprising a translation from a directory or individuals input source to a state database containing resource description triples, a mapping of the triples in the state database from one ontology class to another, and a translation from the triples in the state database to a directory or individuals output sink.
Abstract:
A system which provides additional controls in access management for single sign on deployments, in order to restrict the range of resources in the deployment which could be accessed by an attacker, without unnecessarily burdening the user for their typical and legitimate use of these resources via single sign on. A misuse protection agent (12) intercepts access requests before they reach the target resource, and will check the status of the user for this resource in the database (28).
Abstract:
An information processing system in a computer network comprising an edge system, an identity provider, a relying party and a tracing service, in which the tracing service relays a queue of information of authorized user activity from a relying party to an identity provider, which then can provide that activity information to the user.
Abstract:
A distributed information processing system in an enterprise computer network comprising a collection of servers providing a directory service and a directory-enabled access control system is augmented with the ability to detect user accounts in the directory service for users who have not recently authenticated to an application that uses the directory-enabled access control system.
Abstract:
An information processing system for a computing network in which the access log of a directory server is analyzed to detect anomalous client access requests.
Abstract:
An information processing system containing middleware and backend server software components is augmented with the ability to validate the behavior of the middleware system when one or more backend servers are unavailable, based on dynamic reconfiguration of the network layer protocol software component in the operating system underlying the middleware software component.