摘要:
A method and apparatus for optimizing data transfer between launch and capture domains driven by plesiochronous launch and capture clocks transmits a beacon of representational data from the launch domain to the capture domain and captures the beacon in the capture domain using the capture clock. The captured beacon is monitored for an anomaly. If an anomaly is not detected, a phase of the capture clock is adjusted and the beacon is transmitted, captured and monitored until an anomaly is detected. If an anomaly is detected, the phase of the capture clock is optimized relative to the captured beacon.
摘要:
A registry service is described which uses a partitioned publisher assertion recording and accessing scheme. A publisher assertion regarding a relationship between entities (e.g., business or other types of entities) is encoded within a directory information tree in a memory. The publisher assertion includes publisher assertion part nodes corresponding to entity nodes in the directory information tree. The publisher assertion is complete if all publisher assertion parts corresponding to entities in the relationship are present in the directory information tree. The service may include a network including directory servers and registry servers. The publisher assertions are manipulated by authorized publishers and accessed by users using a variety of techniques, the operations of which are performed by such parties and/or are encoded upon computer-readable media.
摘要:
A system comprising a simulation coordinator, a sensor, and an intrusion detection management component to provide training of intrusion detection administrators by generating simulated notifications of network traffic associated with intrusions.
摘要:
A data model in which a set provides an abstraction that isolates the computation of membership from the details of how an enforcement point determines access (e.g., based on claims, based on security group membership etc). Set operations (e.g., intersection, union, inverse) can then be used across the sets. The architecture utilizes workflow on set transitions such that when an object such as a user enters the scope of one of these sets, notification can occur, such that inadvertent changes which lead to separation-of-duties violations can be detected quickly. The sets can also be used to define entitlements for enforcement of claims-based access control in a cross-organization deployment (e.g., to a cloud-hosted application).