摘要:
A method and information processing system manage policy elements in an information processing system. At least one policy element (110) from a plurality of policy elements stored in at least one policy repository (108) is retrieved. The plurality of policy elements includes at least one of a plurality of reusable policy rules (110), a plurality of reusable policy rule components (118, 120, 122), a plurality of reusable policy rule templates, and a plurality of and policy rule component templates. A new reusable policy element is created from at least one of the policy element (110) that has been retrieved and a default policy element. The new reusable policy element is stored in the at least one policy repository (108). A reusable policy element is queried using metadata (224) associated with the reusable policy element.
摘要:
A method for modifying policy elements is disclosed. At least one reusable policy element (110) is retrieved from at least one repository (108). The reusable policy element (110) includes at least one of a reusable policy rule (110), a reusable policy rule component (118, 120, 122), a reusable policy rule template, and a reusable policy rule component templates. The reusable policy element (110) is modified by one of editing the reusable policy element (110), and deleting the reusable policy element (110).
摘要:
A method and computer program product for detecting a policy conflict in a managed system includes examining a plurality of policy rules for overlapping policy targets, in response to finding no overlapping policy targets, reporting that the policy rules do not conflict, and in response to finding overlapping policy targets, examining the plurality of policy rules for at least two rules having a same condition and a same event, and, in response to not finding at least two rules having a same condition and a same event, reporting that the policy rules do not conflict.
摘要:
A method, information processing system, and system manage network entities. At least a portion of at least one information model (120) for a first managed entity (104) and at least a second managed entity (106) is accessed. The portion of the at least one information model (120) includes a set of capabilities (542) associated with the first managed entity (104) and second managed entity (106), respectively. A first set of capabilities (708) supported by the first managed entity (104) and a second set of capabilities (710) supported by the second managed entity (106) are identified based on the portion of the at least one information model (120). A set of common capabilities (712) from the first set of capabilities (708) and the second set of capabilities (710) that is supported by both of the first managed entity (104) and the second managed entity (106) is determined.
摘要:
A system, method, and information processing system manage a network. At least one contract including one or more components is received at a network that uses a component based architecture. A first operation (422) in the set of operations associated with the contract (114) is mapped to a policy rule event (424) associated with at least one policy rule (116). A second operation (426) in the set of operations associated with the contract (114) is mapped to at least one policy rule condition (428) associated with the policy rule (116). A third operation (430) in the set of operations associated with the contract (116) is mapped to a policy rule action (432) associated with the policy rule (116). A fourth operation (440) in the set of operations associated with the contract (116) is mapped to a policy rule condition (442) associated with the other policy rule (420).
摘要:
A method and computer program product for detecting a policy conflict in a managed system includes examining a plurality of policy rules for overlapping policy targets, in response to finding no overlapping policy targets, reporting that the policy rules do not conflict, and in response to finding overlapping policy targets, examining the plurality of policy rules for at least two rules having a same condition and a same event, and, in response to not finding at least two rules having a same condition and a same event, reporting that the policy rules do not conflict.
摘要:
A system, method, and information processing system manage a network. At least one contract including one or more components is received at a network that uses a component based architecture. A first operation (422) in the set of operations associated with the contract (114) is mapped to a policy rule event (424) associated with at least one policy rule (116). A second operation (426) in the set of operations associated with the contract (114) is mapped to at least one policy rule condition (428) associated with the policy rule (116). A third operation (430) in the set of operations associated with the contract (116) is mapped to a policy rule action (432) associated with the policy rule (116). A fourth operation (440) in the set of operations associated with the contract (116) is mapped to a policy rule condition (442) associated with the other policy rule (420).
摘要:
An identity provider (200) communicates (101) with a first logged-in user who seeks to receive particular streaming content at a first corresponding first user platform and who has also identified at least one other user with whom this user wishes to share the receiving of this content. The identity provider invites (102) the other user to share in the receiving of this content. Upon receiving (103) an acceptance of the invitation from the other user, the identity provider can treat this other user as a logged-in participating second user (i.e., a user who is now both logged-in (even if this user was not previously logged-in) and who wishes to accept the invitation and participate in viewing the streaming content selected by the first user) and automatically direct (104) these users to a content provide to facilitate the substantially simultaneous receipt of the streaming content at all of the corresponding user platforms.
摘要:
A method (1300) for manipulation of two sets of policies is described, wherein each set includes at least two related policies, and wherein each policy comprises a set of policy rules. The method includes identifying (1325) a possible conflict between a pair of policies comprising one policy in each of two sets of policies, marking (1330) the one policy in each of the two sets of policies to identify the possible conflict, and marking (1330) at least one other policy in one of the two sets of policies that is related to one of the marked policies in the two policy rules to identify at least one other possible conflict.
摘要:
A method and system for managing a policy includes, in response to determining the presence of a conflict, determining a semantic equivalence between a component of a policy rule and at least one additional policy rule. The determining a semantic equivalence is performed by using a semantic reasoning algorithm that includes the steps of determining a first policy target of a first policy rule and a second policy target of a second policy rule, determining a meaning of the first policy target and a meaning of the second policy rule, assigning a confidence value based on the determined meaning of the first policy, assigning a confidence value based on the determined meaning of the second policy, performing a semantic comparison between the first policy target and the second policy target, and determining, based at least in part on the semantic comparison, the presence of a conflict between the first and second policy targets.