-
公开(公告)号:US20210055933A1
公开(公告)日:2021-02-25
申请号:US16546775
申请日:2019-08-21
Applicant: International Business Machines Corporation
Inventor: Muhammed Fatih Bulut , Constantin Mircea Adam , Milton H. Hernandez , Maja Vukovic
Abstract: Systems, computer-implemented methods, and computer program products that can facilitate compliance policy management and scheduling are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a policy analyzer component that identifies one or more dependency relationships between a first compliance policy and one or more second compliance policies. The computer executable components can further comprise a scheduler component that generates a policy execution plan based on the one or more dependency relationships.
-
公开(公告)号:US20200076752A1
公开(公告)日:2020-03-05
申请号:US16679440
申请日:2019-11-11
Applicant: International Business Machines Corporation
Inventor: Constantin Mircea Adam , Muhammed Fatih Bulut , Richard Baxter Hull , Anup Kalia , Maja Vukovic , Jin Xiao
IPC: H04L12/58 , G06F16/332 , G06F17/27 , G06Q10/10 , G06N5/02
Abstract: Techniques facilitating maintenance of tribal knowledge for accelerated compliance control deployment are provided. In one example, a system includes a memory that stores computer executable components and a processor that executes computer executable components stored in the memory, wherein the computer executable components include a knowledge base generation component that generates a knowledge graph corresponding to respective commitments created via tribal exchanges, the knowledge graph comprising a semantic level and an operational level; a semantic graph population component that populates the semantic level of the knowledge graph based on identified parties to the respective commitments; and an operational graph population component that populates the operational level of the knowledge graph based on tracked status changes associated with the respective commitments.
-
公开(公告)号:US10511554B2
公开(公告)日:2019-12-17
申请号:US15832330
申请日:2017-12-05
Applicant: International Business Machines Corporation
Inventor: Constantin Mircea Adam , Muhammed Fatih Bulut , Richard Baxter Hull , Anup Kalia , Maja Vukovic , Jin Xiao
IPC: G06F17/27 , H04L12/58 , G06N5/02 , G06Q10/10 , G06F16/332
Abstract: Techniques facilitating maintenance of tribal knowledge for accelerated compliance control deployment are provided. In one example, a system includes a memory that stores computer executable components and a processor that executes computer executable components stored in the memory, wherein the computer executable components include a knowledge base generation component that generates a knowledge graph corresponding to respective commitments created via tribal exchanges, the knowledge graph comprising a semantic level and an operational level; a semantic graph population component that populates the semantic level of the knowledge graph based on identified parties to the respective commitments; and an operational graph population component that populates the operational level of the knowledge graph based on tracked status changes associated with the respective commitments.
-
24.
公开(公告)号:US20190026474A1
公开(公告)日:2019-01-24
申请号:US15842534
申请日:2017-12-14
Applicant: International Business Machines Corporation
Inventor: Constantin Mircea Adam , Nikolaos Anerousis , Jinho Hwang , Shripad Nadgowda , Maja Vukovic
Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.
-
25.
公开(公告)号:US20190026472A1
公开(公告)日:2019-01-24
申请号:US15653676
申请日:2017-07-19
Applicant: International Business Machines Corporation
Inventor: Constantin Mircea Adam , Nikolaos Anerousis , Jinho Hwang , Shripad Nadgowda , Maja Vukovic
Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.
-
-
-
-