摘要:
According to an embodiment of the invention, a system for processing a plurality of service requests in a client-server system includes a challenge server for: presenting a cryptographic challenge to the client; initializing a trust cookie that encodes a client's initial priority level after the client correctly solves the cryptographic challenge; computing a trust level score for the client based on a service request wherein said trust level score is associated with an amount of resources expended by the server in handling the service request such that a higher trust level score is computed for service requests consuming less system resources; assigning the trust level score to the client based on the computation; and embedding the assigned trust level score in the trust cookie included in all responses sent from the server to the client. The system further includes an application server coupled with a firewall.
摘要:
According to an embodiment of the invention, a method for processing a plurality of service requests in a client-server system includes server steps of receiving at least one request for service from a client and providing a level of service based on a trust level provided in the at least one request. According to another embodiment, a method of authenticating messages includes steps of: embedding authentication information into a message at the application level; downloading a script from a computer for sending the message; running said script to send said message to a server; and checking said message by said server at the network level.
摘要:
According to an embodiment of the invention, a system for processing a plurality of service requests in a client-server system includes a challenge server for: presenting a cryptographic challenge to the client; initializing a trust cookie that encodes a client's initial priority level after the client correctly solves the cryptographic challenge; computing a trust level score for the client based on a service request wherein said trust level score is associated with an amount of resources expended by the server in handling the service request such that a higher trust level score is computed for service requests consuming less system resources; assigning the trust level score to the client based on the computation; and embedding the assigned trust level score in the trust cookie included in all responses sent from the server to the client. The system further includes an application server coupled with a firewall.
摘要:
Techniques are disclosed for caching provenance information. For example, in an information system comprising a first computing device requesting provenance data from at least a second computing device, a method for improving the delivery of provenance data to the first computing device, comprises the following steps. At least one cache is maintained for storing provenance data which the first computing device can access with less overhead than accessing the second computing device. Aggregated provenance data is produced from input provenance data. A decision whether or not to cache input provenance data is made based on a likelihood of the input provenance data being used to produce aggregated provenance data. By way of example, the first computing device may comprise a client and the second computing device may comprise a server.
摘要:
Techniques are disclosed for caching provenance information. For example, in an information system comprising a first computing device requesting provenance data from at least a second computing device, a method for improving the delivery of provenance data to the first computing device, comprises the following steps. At least one cache is maintained for storing provenance data which the first computing device can access with less overhead than accessing the second computing device. Aggregated provenance data is produced from input provenance data. A decision whether or not to cache input provenance data is made based on a likelihood of the input provenance data being used to produce aggregated provenance data. By way of example, the first computing device may comprise a client and the second computing device may comprise a server.
摘要:
Improved key management techniques are disclosed for temporal access control of one or more services in a computer network. For example, a method for providing access control in a client-server system includes the following steps. A client obtains an authorization key for a time interval. A server derives an encryption key corresponding to a given time and uses the encryption key to encrypt a message. The client derives a decryption key corresponding to the given time and decrypts the message.
摘要:
According to an embodiment of the invention, a method for processing a plurality of service requests in a client-server system includes server steps of receiving at least one request for service from a client and providing a level of service based on a trust level provided in the at least one request. According to another embodiment, a method of authenticating messages includes steps of: embedding authentication information into a message at the application level; downloading a script from a computer for sending the message; running said script to send said message to a server; and checking said message by said server at the network level.
摘要:
Network management data is managed by determining that a first version and a second version of a set of network management data have been created. The set of network management data is associated with a plurality of managed entities in a network. First and second network graphs are created based on the first version and second version of the set of network management data, respectively. The first and second network graphs include a first and second set of entities in the plurality of managed entities, respectively. A similarity metric is assigned between at least one or more entities in the first and second set of entities. At least a first entity in the first set of entities and at least a second entity in the second set of entities are determined to be identical entities based on the similarity metric being one of equal to and above a first given threshold.
摘要:
Methods and apparatus are provided for performing byte caching using a chunk size based on the object type of the object being cached. Byte caching is performed by receiving at least one data packet from at least one network node; extracting at least one data object from the at least one data packet; identifying an object type associated with the at least one data packet; determining a chunk size associated with the object type; and storing at least a portion of the at least one data packet in a byte cache based on the determined chunk size. The chunk size of the object type can be determined, for example, by evaluating one or more additional criteria, such as network conditions and object size. The object type may be, for example, an image object type; an audio object type; a video object type; and a text object type.
摘要:
A method, system and computer program product for managing content distribution in a mobile communications environment. The communications environment includes a core network and a multitude of end-user devices. In one embodiment, the method comprises downloading content from the core network to the end-user devices; and maintaining a map between the end-user devices, the content downloaded to the end-user devices, and the locations of the end-user devices. When a first of the end-user devices requests a specified content, this map and one or more rules are used to identify a second of the end-user devices having the specified content. The first of the end-user devices fetches the specified content from this identified second of the end-user devices. In one embodiment, object location descriptors embedded in the content are rewritten when the content is downloaded to the end-user devices.