A method and system that enables a security policy to separate developer-provided detection criteria from an administrator-provided custom policy is provided. The security system allows a developer of detection criteria to provide a signature file containing the signatures that are available for use by a security policy. The security system also allows an administrator of a computer system to specify a custom policy that uses the signatures of the signature file. The developer may distribute the signature file to host computer systems independently of the administrator's distribution of the rules of the custom policy to the host computer systems. When a security enforcement event occurs at the host computer system, the security system applies the rules of the security policy to the event.

 
Web www.patentalert.com

< Inferring object invariant method and system

> Method and system for the utilization of collaborative and social tagging for adaptation in web portals

> Method and apparatus for analyzing call history data derived from execution of a computer program

~ 00543