摘要:
A method for dynamically updating a service level agreement, performed by a cloud computing server, includes storing a preference for service selection, acquiring an actual usage level of a first service provided to a user during a predetermined time period in accordance with a first service level agreement, determining a second service level agreement different from the first service level agreement based on the actual usage level acquired during the predetermined time period, and selecting a second service that satisfies the second service level agreement.
摘要:
To display contents desired by a user in one information terminal onto another information terminal having no special software for collaboration when collaboration is performed through internets. If a customer clicks on a “call button” with a browser, an agent who performs collaboration is assigned. The browser on the customer side shows both a screen starting a default and an object giving instructions to display the next page. The screen on the agent side shows the number of a document to which the customer refers, and the agent can change this number. If the customer selects the object giving instructions to display the next page, a hypertext makeup language (HTML) including that object is generated based on the document number changed by the agent, the HTML being transmitted to the customer side.
摘要:
A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation.
摘要:
A computer network connects to a first computer, a second computer, other multiple computers, and a job category database A service to be executed by any of the other multiple computers is divided into multiple jobs; the job category is associated with each of the divided jobs; a region code and an instruction to execute the service are received from the first computer; and for each of the multiple jobs, the job category database is searched with the received region code and the associated job category as keys to acquire the operation identifier list corresponding to the job; the operation identifier list is transmitted to at least one of the other multiple computers; and a combination of the job, the identifier of that other computer and the identifier list are transmitted to the first computer.
摘要:
A method, system and computer program of managing an access right to at least one asset associated with at least one digital work order, or to at least one element associated with the asset, and provides a system and a computer program for the same. The method includes the steps of: loading a security policy associated with the work order, the asset, or the element; starting to monitor location information of the asset or the element and a moving object, or a elapsed time of the moving object at the location; and issuing an event for managing the asset, the element or the moving object in response to the start of the work order or in response to the fact that the loaded security policy is violated by any of the locations, a change in the location, or the elapsed time at the location obtained by the monitoring.
摘要:
Disclosed embodiments include a method for receiving, at a configuration information server, an encrypted password associated with a configuration item, where the encrypted password is encrypted using an encryption key. The method further includes encrypting a decrypted password to generate a reencrypted password, where the decrypted password is derived from the encrypted password. The method further includes transmitting the reenrypted password to the configuration item and removing the decrypted password from the configuration information collection server.
摘要:
A method of managing an access right to at least one asset associated with at least one digital work order, to at least one first element associated with the at least one asset, or to at least one second element associated with an access path to the at least one asset or the first element, and relates to a system and a computer program for the same.
摘要:
A computer network connects to a first computer, a second computer, other multiple computers, and a job category database A service to be executed by any of the other multiple computers is divided into multiple jobs; the job category is associated with each of the divided jobs; a region code and an instruction to execute the service are received from the first computer; and for each of the multiple jobs, the job category database is searched with the received region code and the associated job category as keys to acquire the operation identifier list corresponding to the job; the operation identifier list is transmitted to at least one of the other multiple computers; and a combination of the job, the identifier of that other computer and the identifier list are transmitted to the first computer.
摘要:
Deterioration of service quality due to shortage of resources and/or increased cost of support due to excessive resources is minimized in the case where the amount of requested services may change in cloud computing. Provided are mechanisms for executing a process specified by a user in a cloud computing environment and charging the user for the process. The mechanisms include a receiving part for receiving an instruction to execute the specified process and a determining part for determining an external resource to provision from a first other computer system for a charge. The mechanisms further comprise an external resource securing part for securing the external resource on the first other computer system and an executing part for causing the external resource to execute at least a part of the specified process.
摘要:
A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. The client receives and stores the copied file and the public-key information. In a case where the copied file is updated, the client encrypts difference information on the difference arising in the updating using the public-key information and transmits the difference information to the mediation server. The client determines whether the condition for being secure is satisfied when a process for updating the copied file becomes possible. When determining that the condition is not satisfied, the client deletes the copied file.