Under the present invention, a mapping is provided that interrelates security permissions for an application-based resource with security permissions for a set of IT-based resources in the distributed system. When a desired security permission for the application-based resource is expressed, the mapping can be accessed to determine the corresponding security permissions for the IT-based resources. Once these security permissions are determined, resource plug-ins corresponding to the IT-based resources will effect their respective security permissions.

 
Web www.patentalert.com

< Rendering graphics/image data using dynamically generated video streams

< Delivering a geographic-specific comprehensive program guide

> System, method and program to filter out login attempts by unauthorized entities

> Computer network and methods for granting and revoking access privileges for an information source

~ 00239