Highly scalable and highly available cluster system management scheme

    公开(公告)号:US07870235B2

    公开(公告)日:2011-01-11

    申请号:US12139116

    申请日:2008-06-13

    IPC分类号: G06F15/16 G06F12/00

    CPC分类号: G06F9/5061 G06F11/1425

    摘要: A cluster system is treated as a set of resource groups, each resource group including a highly available application and the resources upon which it depends. A resource group may have between 2 and M data processing systems, where M is small relative to the cluster size N of the total cluster. Configuration and status information for the resource group is fully replicated only on those data processing systems which are members of the resource group. A configuration object/database record for the resource group has an associated owner list identifying the data processing systems which are members of the resource group and which may therefore manage the application. A data processing system may belong to more than one resource group, however, and configuration and status information for the data processing system is replicated to each data processing system which could be affected by failure of the subject data processing system—that is, any data processing system which belongs to at least one resource group also containing the subject data processing system. The partial replication scheme of the present invention allows resource groups to run in parallel, reduces the cost of data replication and access, is highly scalable and applicable to very large clusters, and provides better performance after a catastrophe such as a network partition.

    Highly Scalable and Highly Available Cluster System Management Scheme
    4.
    发明申请
    Highly Scalable and Highly Available Cluster System Management Scheme 有权
    高可扩展性和高可用性集群系统管理方案

    公开(公告)号:US20080320113A1

    公开(公告)日:2008-12-25

    申请号:US12139116

    申请日:2008-06-13

    IPC分类号: G06F15/16

    CPC分类号: G06F9/5061 G06F11/1425

    摘要: A cluster system is treated as a set of resource groups, each resource group including a highly available application and the resources upon which it depends. A resource group may have between 2 and M data processing systems, where M is small relative to the cluster size N of the total cluster. Configuration and status information for the resource group is fully replicated only on those data processing systems which are members of the resource group. A configuration object/database record for the resource group has an associated owner list identifying the data processing systems which are members of the resource group and which may therefore manage the application. A data processing system may belong to more than one resource group, however, and configuration and status information for the data processing system is replicated to each data processing system which could be affected by failure of the subject data processing system—that is, any data processing system which belongs to at least one resource group also containing the subject data processing system. The partial replication scheme of the present invention allows resource groups to run in parallel, reduces the cost of data replication and access, is highly scalable and applicable to very large clusters, and provides better performance after a catastrophe such as a network partition.

    摘要翻译: 集群系统被视为一组资源组,每个资源组包括高度可用的应用程序及其所依赖的资源。 资源组可以具有2和M个数据处理系统,其中M相对于总集群的集群大小N是小的。 资源组的配置和状态信息仅在作为资源组成员的那些数据处理系统上完全复制。 用于资源组的配置对象/数据库记录具有标识作为资源组的成员并且因此可以管理该应用的数据处理系统的关联所有者列表。 然而,数据处理系统可以属于多个资源组,并且数据处理系统的配置和状态信息被复制到可能受主题数据处理系统的故障影响的每个数据处理系统 - 即任何数据 处理系统,其属于还包含对象数据处理系统的至少一个资源组。 本发明的部分复制方案允许资源组并行运行,降低数据复制和访问的成本,是高度可扩展的并且适用于非常大的集群,并且在诸如网络分区的灾难之后提供更好的性能。

    Integrated Security Roles
    5.
    发明申请
    Integrated Security Roles 有权
    综合安全角色

    公开(公告)号:US20080295147A1

    公开(公告)日:2008-11-27

    申请号:US12049139

    申请日:2008-03-14

    IPC分类号: G06F21/00

    CPC分类号: H04L63/102 G06F21/6236

    摘要: An approach to handling integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.

    摘要翻译: 介绍了一种处理集成安全角色的方法。 上游应用程序包括一个或多个对应于上游安全角色和下游安全角色的角色映射要求。 通过在下游应用程序的角色映射表中添加上游安全角色标识符,或通过向下游应用程序的角色映射表添加上游用户到角色映射来扩展上游安全角色。 当扩展上游安全角色时,分配给上游安全角色的用户可以自动访问角色映射的下游应用程序。

    Application Server Object-level Security for Distributed Computing Domains
    6.
    发明申请
    Application Server Object-level Security for Distributed Computing Domains 有权
    分布式计算域的应用服务器对象级安全性

    公开(公告)号:US20080222697A1

    公开(公告)日:2008-09-11

    申请号:US12123693

    申请日:2008-05-20

    IPC分类号: G06F21/00

    CPC分类号: G06F21/31

    摘要: Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components.

    摘要翻译: 应用服务器上的对象可以被定义为接收不同级别的安全保护的类,例如用户对象和管理对象的定义。 可以在管理对象上实施全域安全性,可以为域中的每个应用程序服务器单独配置哪些用户对象安全性。 在CORBA体系结构中,IOR对于在域范围内进行安全保护的共享对象(如管理对象)在IOR创建和导出到名称服务器期间提供了已标记组件。 之后,当客户端使用IOR时,客户机根据标记的组件调用必要的安全措施,如认证,授权和传输保护。

    Role-based access control management for multiple heterogeneous application components
    7.
    发明申请
    Role-based access control management for multiple heterogeneous application components 失效
    基于角色的多个异构应用程序组件的访问控制管理

    公开(公告)号:US20070056026A1

    公开(公告)日:2007-03-08

    申请号:US11221630

    申请日:2005-09-08

    IPC分类号: H04L9/32

    CPC分类号: G06F21/6236

    摘要: Embodiments of the present invention address deficiencies of the art in respect to access control and provide a method, system and computer program product for access control management for a collection of heterogeneous application components. In a first embodiment, a data processing system for role-based access control management for multiple heterogeneous application components can include at least one business role descriptor associating a business role with multiple, different application roles for corresponding, disparate application components. The system also can include at least one access policy associating a user with the business role. Finally, the system can include policy deployment logic include program code enabled to process the access policy to assign the user to the different application roles in the disparate application components.

    摘要翻译: 本发明的实施例解决了本领域在访问控制方面的缺陷,并提供了用于异构应用组件的集合的访问控制管理的方法,系统和计算机程序产品。 在第一实施例中,用于多个异构应用组件的用于基于角色的访问控制管理的数据处理系统可以包括将业务角色与用于相应的不同应用组件的多个不同应用角色相关联的至少一个业务角色描述符。 系统还可以包括将用户与业务角色相关联的至少一个访问策略。 最后,系统可以包括策略部署逻辑,包括能够处理访问策略的程序代码,以将用户分配给不同应用程序组件中的不同应用程序角色。

    System and method for using security levels to improve permission checking performance and manageability
    8.
    发明申请
    System and method for using security levels to improve permission checking performance and manageability 失效
    使用安全级别提高权限检查性能和可管理性的系统和方法

    公开(公告)号:US20060005019A1

    公开(公告)日:2006-01-05

    申请号:US10865348

    申请日:2004-06-10

    申请人: Ching-Yun Chao

    发明人: Ching-Yun Chao

    IPC分类号: H04L9/00

    CPC分类号: G06F21/52 G06F2221/2113

    摘要: A system and method is provided for reducing the complexity and improving the performance of enforcing security restrictions on the execution of program code in a runtime environment. In a preferred embodiment, units of executable code, such as methods or functions, are classified by “security level.” Code units belonging to a “trusted” security level may call any other code unit in the runtime environment, but other security levels are restricted in the code units they can call. Code units may also have “instance permissions” to allow them to have permission to call other individually-specified code units that they would normally be precluded from calling, due to their security level. The security level scheme described herein reduces the complexity of establishing permissions with respect to different code units in the runtime environment. This security level scheme also improves runtime performance by making it unnecessary to check individually-defined permissions in many cases.

    摘要翻译: 提供了一种系统和方法,用于降低复杂性并提高在运行时环境中执行程序代码的安全限制的性能。 在优选实施例中,诸如方法或功能的可执行代码单元被“安全级别”分类。 属于“受信任”安全级别的代码单元可以调用运行时环境中的任何其他代码单元,但是其他安全级别在他们可以调用的代码单元中受到限制。 由于代码单元的安全级别,代码单元也可能具有“实例许可”,允许他们有权调用他们通常被排除在外的其他单独指定的代码单元。 本文描述的安全级别方案降低了在运行时环境中相对于不同代码单元建立许可的复杂性。 这种安全级别方案还可以通过在许多情况下不需要检查单独定义的权限来提高运行时性能。

    System and method for using security levels to simplify security policy management
    9.
    发明申请
    System and method for using security levels to simplify security policy management 审中-公开
    使用安全级别简化安全策略管理的系统和方法

    公开(公告)号:US20050278790A1

    公开(公告)日:2005-12-15

    申请号:US10865345

    申请日:2004-06-10

    CPC分类号: G06F21/54 G06F2221/2113

    摘要: A system and method is provided for reducing the complexity and improving the performance of enforcing security restrictions on the execution of program code in a runtime environment. In a preferred embodiment, units of executable code, such as methods or functions, are classified by “security level.” Code units belonging to a “trusted” security level may call any other code unit in the runtime environment, but other security levels are restricted in the code units they can call. In a preferred embodiment, the security levels are represented by corresponding permission objects. Each permission object that is associated with a particular security level includes a numerical value that denotes that security level. Security policies can be enforced with respect to caller and callee code units by comparing numerical values of corresponding permission objects. This security level scheme also improves runtime performance by making it unnecessary to check individually-defined permissions in many cases.

    摘要翻译: 提供了一种系统和方法,用于降低复杂性并提高在运行时环境中执行程序代码的安全限制的性能。 在优选实施例中,诸如方法或功能的可执行代码单元被“安全级别”分类。 属于“受信任”安全级别的代码单元可以调用运行时环境中的任何其他代码单元,但是其他安全级别在他们可以调用的代码单元中受到限制。 在优选实施例中,安全级别由相应的许可对象表示。 与特定安全级别相关联的每个权限对象包括表示该安全级别的数值。 通过比较相应权限对象的数值,可以对呼叫者和被叫方代码单元执行安全策略。 这种安全级别方案还可以通过在许多情况下不需要检查单独定义的权限来提高运行时性能。

    Declarative trust model between reverse proxy server and websphere application server
    10.
    发明申请
    Declarative trust model between reverse proxy server and websphere application server 审中-公开
    反向代理服务器和Websphere应用服务器之间的声明信任模型

    公开(公告)号:US20050154886A1

    公开(公告)日:2005-07-14

    申请号:US10755828

    申请日:2004-01-12

    IPC分类号: H04L9/00 H04L29/06

    摘要: A method and system for providing a declarative trust association model that formalizes the way trust is established and requires corresponding authentication information to be presented in a standard format. Consequently, the application server may provide a guaranteed level of protection. The mechanism of the present invention provides a framework that allows an application server to enforce a trust evaluation and allows reverse proxy security server to assert a client's security identity, as well as other client security credential information. A known trust association interceptor model is extended to allow the reverse proxy security server to assert the authenticated user's security attributes. Such security attributes include, for example, group information, authentication strength, and location (i.e., where does the user enter the request, intranet vs. internet, IP address, etc.,). The security attributes can be used in making authorization decisions.

    摘要翻译: 一种用于提供声明性信任关联模型的方法和系统,其形式化信任建立的方式,并且需要以标准格式呈现相应的认证信息。 因此,应用服务器可以提供有保证的保护级别。 本发明的机制提供了一种框架,其允许应用服务器执行信任评估,并允许反向代理安全服务器断言客户端的安全身份以及其他客户端安全凭证信息。 扩展了一个已知的信任关联拦截器模型,以允许反向代理安全服务器断言经过身份验证的用户的安全属性。 这样的安全属性包括例如组信息,认证强度和位置(即,用户进入请求,内联网与互联网,IP地址等在哪里)。 安全属性可用于作出授权决定。