Improved detecting the authorization requirements and defining the security policies for an application comprising one or more components is disclosed. A call and resource-access graph is used to model all the possible paths of execution within the application. Then, paths of execution detected during the analysis are combined with the access control information found in the security policy of the application. Finally, for each authorization point in the application, a minimal security policy is reported that the executing principal should be granted in order to pass the authorization successfully.

 
Web www.patentalert.com

< Duplicate merge avoidance in parallel development of interdependent semi-derived artifacts

< Parameterization of programming structures

> Attempting runtime retranslation of unresolvable code

> System and method for generating embedded resource updates for output device

~ 00221