Abstract: An improved method and apparatus for auditing database queries, wherein comments are added by a server prior to the server forwarding the queries to the database system. The comments are then used to derive audit information, which is correlated with other audit information in a different server, to produce a more complete audit record.
Abstract: An improved method and apparatus for auditing database queries, wherein comments are added by a server prior to the server forwarding the queries to the database system. The comments are then used to derive audit information, which is correlated with other audit information in a different server, to produce a more complete audit record.
Abstract: An improved method and apparatus for auditing database queries, wherein comments are added by a server prior to the server forwarding the queries to the database system. The comments are then used to derive audit information, which is correlated with other audit information in a different server, to produce a more complete audit record.
Abstract: A rules based system enforces security policies in a data access management system. The rules based system provides rules that preclude certain activities, but those rules are only implemented and fired upon certain conditions occurring. This results in certain actions being precluded when specified conditions are true, without additional software required to check for the condition each time the action is requested.
Abstract: A rules based system enforces security policies in a data access management system. The rules based system provides rules that preclude certain activities, but those rules are only implemented and fired upon certain conditions occurring. This results in certain actions being precluded when specified conditions are true, without additional software required to check for the condition each time the action is requested.
Abstract: A method of detecting fraud and/or unauthorized database access and enhancing the efficiency of a data warehouse system by utilizing a usage profile of a user. The user profiles are generated from usage patterns, and the user profile is preferably utilized to both enforce security policies through detection of breaches and to improve user friendliness via customized portals that are constructed from the profiles.
Abstract: A rule construction and application technique is disclosed wherein atomic rules are used alone or in combination with template rules in order to construct complex rules. The complex rules may be stored and/or applied to objects, and may also be used to generate further rules. A domain agent is disclosed that acts to operate between the object and the rule.
Abstract: A system of rules described which allows for generic rules to be customized and utilized in specific environments on a dynamic and specific basis.
Abstract: An improved expert system is disclosed wherein rules are organized into domains and subdomains, and objects are passed to rules to be operated upon. Prior to operating upon any object, the domain determines if the object is of the type which is to be operated upon by rules within the rule domain. If not, the rules are not applied to the object.