摘要:
A system and method for applying a people network representation to aid contact between a member of an organization and a target individual selects a contact path between the member and the target supported by analysis of the level of interaction between members of the organization based on network communications of the organization. Level of interaction is analyzed using network communications that take into account the recentness and frequency of interactions, such as email, ICQ, or phone interaction. To contact a targeted individual, for instance such as to obtain expertise in a desired area, the model of the people network allows determination of a contact path between the member and target which improves the likelihood of obtaining the target's expertise. A contact path from a member may include a suggestion to contact the target through one or more intervening organization members.
摘要:
Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to be described in an extensible manner using protocol-neutral and platform-independent methodologies. A metadata scope refers to a dynamic universe of targets to which the included metadata statements correspond. Metadata properties provide a mechanism to describe the metadata itself, and metadata security can be used to ensure authentic metadata is sent and received. Mechanisms are also provided to allow refinement and replacement of metadata statements. The generic metadata container can be adapted to dynamically define access control rights to a range of objects by a range of users, including granted and denied access rights.
摘要:
Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to be described in an extensible manner using protocol-neutral and platform-independent methodologies. A metadata scope refers to a dynamic universe of targets to which the included metadata statements correspond. Metadata properties provide a mechanism to describe the metadata itself, and metadata security can be used to ensure authentic metadata is sent and received. Mechanisms are also provided to allow refinement and replacement of metadata statements. The generic metadata container can be adapted to dynamically define access control rights to a range of objects by a range of users, including granted and denied access rights.
摘要:
A system and method for applying a people network representation to aid contact between a member of an organization and a target individual selects a contact path between the member and the target supported by analysis of the level of interaction between members of the organization based on network communications of the organization. The people network of the organization is modeled. Level of interaction is analyzed using network communications that take into account the recentness and frequency of interactions, such as email, ICQ, or phone interaction. To contact a targeted individual, for instance such as to obtain expertise in a desired area, the model of the people network allows determination of a contact path between the member and target which improves the likelihood of obtaining the target's expertise. A contact path from a member may include a suggestion to contact the target through one or more intervening organization members.
摘要:
A system for processing multiple types of security schemes includes a server having a claims engine that extracts claim(s) from security token(s) and maps extracted claims to other claims. The term claim as used in this context is a statement about a token's subject. The claims engine can extract claim(s) from one or more different types of security tokens corresponding to the multiple security schemes. These extracted claim(s) can then be selectively mapped to other claims using mapping information that is accessible to the server. The security decision can then be based on the extracted and/or derived claim(s) rather than tokens. This system can thereby support multiple security schemes and simplify the security process for the user.