摘要:
Security is optimized in the context of a credential transformation service (CTS) by utilizing a web services client runtime to gather information for determining whether or not a target web service is hosted in a security domain used by a client application and for determining whether or not the target web service uses an authentication mechanism substantially identical to that used by the client application. The gathered information is carried in an endpoint reference (EPR) of the target web service. In response to the client receiving the EPR, the client applies an optimization process to eliminate a possible unnecessary invocation of the CTS, wherein the target web service is an authoritative manageable resource having minimal or no responsibility for providing its identity, and having minimal or no responsibility for advertising any creation and destruction lifecycle related events.
摘要:
Security is optimized in the context of a credential transformation service (CTS) by utilizing a web services client runtime to gather information for determining whether or not a target web service is hosted in a security domain used by a client application and for determining whether or not the target web service uses an authentication mechanism substantially identical to that used by the client application. The gathered information is carried in an endpoint reference (EPR) of the target web service. In response to the client receiving the EPR, the client applies an optimization process to eliminate a possible unnecessary invocation of the CTS, wherein the target web service is an authoritative manageable resource having minimal or no responsibility for providing its identity, and having minimal or no responsibility for advertising any creation and destruction lifecycle related events.
摘要:
A system for managing topologies includes a topology data datastore that stores topology information. A topology computer element interfaces with the topology data datastore to create and update a topology of resources. A subscription computer element generates notifications to a user based on at least one of the creating and the updating of the topology of resources and further based on subscription data.
摘要:
A system for managing topologies includes a topology data datastore that stores topology information. A topology computer element interfaces with the topology data datastore to create and update a topology of resources. A subscription computer element generates notifications to a user based on at least one of the creating and the updating of the topology of resources and further based on subscription data.
摘要:
A system and method enabling the search for a three-dimensional virtual world object across the universe of virtual worlds by utilizing a two-step search process to first identify the object and second, to actively locate and generate a URI to all presently manifest instances of that object.
摘要:
A mechanism is provided for providing compartmentalized security in product reviews. A central authoritative state module within a compartmentalized security mechanism identifies a clearance level associated with a user that has been authenticated. Responsive to the clearance level of the user being sufficient to access the information, the central authoritative state module determines whether the information requires a simulation to be executed. Responsive to the information failing to require execution of a simulation, a coordination module in the compartmentalized security mechanism retrieves the information. A display and input interaction module on a client system then displays the information in accordance with the clearance level of the user thereby forming displayed information. Displaying the information in accordance with the clearance level of the user comprises displaying in detail only portions of the information of the product that the user has access to.
摘要:
A mechanism is provided for providing compartmentalized security in product reviews. A central authoritative state module within a compartmentalized security mechanism identifies a clearance level associated with a user that has been authenticated. Responsive to the clearance level of the user being sufficient to access the information, the central authoritative state module determines whether the information requires a simulation to be executed. Responsive to the information failing to require execution of a simulation, a coordination module in the compartmentalized security mechanism retrieves the information. A display and input interaction module on a client system then displays the information in accordance with the clearance level of the user thereby forming displayed information. Displaying the information in accordance with the clearance level of the user comprises displaying in detail only portions of the information of the product that the user has access to.
摘要:
The present invention relates to the field of systems management on IT-resources using web services. An improved method proposes a single web service implementation which dynamically and automatically generates multiple WSDLs for respective multiple resource type classes. This implementation is model-agnostic, as it doesn't require any knowledge about the underlying model, be that a resource model, or any other model in question, and uses introspection of the applied model at the time of invocation for the dynamic WSDL generation. The state of the resource is maintained within the instrumentation of the resource. No additional persistence on top needs to be implemented. A single implementation of a low number of generic web services, basically only two, reduces implementation and maintenance efforts significantly.
摘要:
The idea of the present invention is to provide a challenge-response mechanism to acquire work scope split range information from the application's Work Scope Split component of the over-utilized resource. By using the work scope split range information, the provisioning system is able to add a new resource, install a new application for that new resource, configure the new and the over-utilized resource's application, and reconfigure the load-balancer in accordance with the work scope split range information. The present invention adds scalability to complex and stateful application programs and allows dynamic provisioning of resources for these application programs.
摘要:
A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.