An Information Visualization Software System to Manage Resource Access Control Policies Jaime Montemayor, Inventor Thomas Llanso, Inventor.

Slides:



Advertisements
Similar presentations
System Administrator Roles in Supporting Site Customizations Lynn Ritger Software Integrations Coordinator, FASTER Asset Solutions.
Advertisements

A distributed architecture for crystallography data, metadata, and applications John C. Bollinger Indiana University Molecular Structure Center, Bloomington,
1.
Computational Model of a 5th Percentile Male Human Torso Emily Ward, Inventor Jack Roberts, Inventor Michael Kleinberger, Inventor.
Trusted Ring: A Security Enhancing Software Architecture Michael DiRossi, Inventor The Johns Hopkins University Applied Physics Laboratory.
CollabSpace – An Advanced Geospatial Collaboration Environment Nigel Tzeng, PI Jennifer Ockerman, Nathan Koterba, Osbaldo Cantu Johns Hopkins University.
_UK.PPT-1 Swarming Network for Intruder Detection Jerry A. Krill, Mike J. O‘Driscoll Johns Hopkins University - Applied Physics Laboratory.
Social Relationship Identification in Informal, Online Communication Archives Chris Diehl, JHU/APL Galileo Namata and Lise Getoor, University of Maryland.
Graph Query Language for Analyzing Data Graphs David Silberberg, Paul Frank, Wayne Bethea and John Gersh – Inventors.
Remotely Directed Vehicle Inspection System Protagoras Cutchis, Inventor.
Lesson-10 Information System Building Blocks(2)
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Irwin/McGraw-Hill Copyright © 2004 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS6th Edition.
Iowa Interactive Overview for the IOWAccess Advisory Council September 10, 2008.
Chapter 2: IS Building Blocks Objectives
Organizational Influences and Life Cycle
1 Tuesday, August 16, 2005 W E B C A S T August 16, 2005 Policy Development Theory & Practice: An Emphasis on IT Pat Spellacy Director of Policy & Process.
Towards Higher Assurance Software Construction via Aspects Thomas Llansó, Inventor.
Creating Business Workflow Using SharePoint Designer 2007 Presented by Tarek Ghazali IT Technical Specialist Microsoft SQL Server MVP Microsoft SQL Server.
Bina Nusantara 2 C H A P T E R INFORMATION SYSTEM BUILDING BLOCKS.
MAV Environment Conference Changes, new initiatives and directions - councils’ environmental obligations in 2014 and beyond.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Tutor: Prof. A. Taleb-Bendiab Contact: Telephone: +44 (0) CMPDLLM002 Research Methods Lecture 8: Quantitative.
Capability Based Planning Methodology and Tool Karen Kohri, Jeff Brown Clarence Wong, Chris Latimer Inventors.
SOS EGEE ‘06 GGF Security Auditing Service: Draft Architecture Brian Tierney Dan Gunter Lawrence Berkeley National Laboratory Marty Humphrey University.
Copyright © 2004 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS6th Edition Irwin/McGraw-Hill.
2131 Structured System Analysis and Design By Germaine Cheung Hong Kong Computer Institute Lecture 2 (Chapter 2) Information System Building Blocks.
Social media is no longer a choice but a necessity.
GOC Technical Architecture GoC Position on Open Source Presentation to eGovOS Open Source in Government Series March 15, 2004.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
© 2013 South-Western, a part of Cengage Learning. All rights reserved. Chapter 14 | Slide 1 Chapter 14: Understanding Information and e-Business.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Auditing Information Systems (AIS)
Description of Work Objectives WP 8 serves to define the technical content of the VI for contact thermometry. It will contain a selection of guides to.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © 2004 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS6th Edition Irwin/McGraw-Hill.
U.S. Department of Agriculture eGovernment Program eGovernment Working Group Meeting February 11, 2004.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
Issues and Challenges for Integrated Surveillance Systems Daniel M. Sosin, MD, MPH Division of Public Health Surveillance and Informatics Epidemiology.
Compliance Promotion Formalizing an Approach to Support Stakeholder Compliance.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
GET CONNECTED Information Technology Career Cluster.
Creating Multimedia Repositories: new media, new metadata, new interactions…. Edinburgh Repositories Fringe, 31 Jul-01 Aug, 2008.
Changing Role of Librarians in Digital Era and Need of Professional skills, Efficiency & Competency By Goutam Biswas
Working with HIT Systems Unit 7a Protecting Privacy, Security, and Confidentiality in HIT Systems This material was developed by Johns Hopkins University,
Ministry of Finance of the Republic of Azerbaijan State Treasury Agency Public Finance Management Information System.
3M Display & Graphics © 3M All Rights Reserved. Predict. Measure. Optimize. Control. Realizing the Full Potential of Digital Communication Networks.
Putting Social Media to Good Use Jeff Moriarty, Sitewire Director Social Media Strategy.
Virtual Directory Services and Directory Synchronization May 13 th, 2008 Bill Claycomb Computer Systems Analyst Infrastructure Computing Systems Department.
Information Technology
Securing Information Systems
The Components of Information Systems
NDMS AMS Authentication
Introduction and Concepts
The Role of HIT in Pay for Performance
INPE, São José dos Campos (SP), Brazil
The Components of Information Systems
Benjamin Murray Ray Dennis June 9, 2016
Provider Educational Seminar
SECURITY MECHANISM & E-COMMERCE
Health Care: Privacy in a Digital Age
KNOWLEDGE MANAGEMENT (KM) Session # 34
ES SYSTEM SYSTEM BRIEF.
Information System Building Blocks
OU BATTLECARD: Oracle Identity Management Training
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

An Information Visualization Software System to Manage Resource Access Control Policies Jaime Montemayor, Inventor Thomas Llanso, Inventor

Problem Background Complex digital Access Control policies/ rules can be difficult to author, analyze, update, approve, and reverse-engineer. –Access can be a function of many factors –Visualization techniques can help manage complex rule sets Security clearance Physical location Type of workstation Type of user login Role / Group Time of day Operational Need Security Risk

Access Visualization Tool (“Ruba”) Visualize policies from many angles Reveal hidden relationships, interactions Useful for experts and non-experts alike

Groups and Hierarchy Different Views Answer Different Questions

Access Control Matrix Different Views Answer Different Questions

Incremental Exploration Different Views Answer Different Questions

Technical Applicability Useful anywhere control access required –Networks, virtual networks –Web sites, portals, web services, messaging –Databases, directories, other repositories Useful to different stakeholders –Network, repository, mission owners –System support personnel –System Certifiers –System and Network Accreditors

Commercial Applicability Relevant across many industries –Government / Military –Medical –Financial –Legal –Entertainment Can play a role in meeting the spirit of security-related legislation –HIPAA –Graham Leach Bliley Act

Commercial Opportunities For technical information contact: Jaime Montemayor, Inventor Thomas Llanso, Inventor For licensing information contact: Norma Lee Todd, Technology Manager Office of Technology Transfer The Johns Hopkins University Applied Physics Laboratory Johns Hopkins Road Laurel, MD