摘要:
Systems, methods, and other embodiments associated with event processing are described. In one embodiment, a method includes detecting an event. The example method may also include analyzing the event to extract information about the user and processing a subsequent event in accordance with the extracted information about the user.
摘要:
Systems, methods, and other embodiments associated with event processing are described. In one embodiment, a method includes detecting an event. The example method may also include analyzing the event to extract information about the user and processing a subsequent event in accordance with the extracted information about the user.
摘要:
One embodiment of the present invention provides an enterprise system that automatically executes a rule associated with an event. During operation, the system receives an event object at the enterprise system. Next, the system creates an intermediate event object based on the event object, wherein the intermediate object is an invocation context for the rule. The system also filters a set of rules with the intermediate event object to obtain a subset of rules. The system then selects a rule that is associated with the event from the subset of rules. Finally, the system executes the rule.
摘要:
One embodiment of the present invention provides an enterprise system that automatically executes a rule associated with an event. During operation, the system receives an event object at the enterprise system. Next, the system creates an intermediate event object based on the event object, wherein the intermediate object is an invocation context for the rule. The system also filters a set of rules with the intermediate event object to obtain a subset of rules. The system then selects a rule that is associated with the event from the subset of rules. Finally, the system executes the rule.
摘要:
Systems, methods, and other embodiments associated with bi-temporal user profiling are described. An event is detected that occurs at a valid event time. In response to the event, a repository is accessed that stores data describing one or more user profiles that include a profile record valid time period specifying a time at which the given profile record is valid. A prior user profile record is retrieved that has a profile record valid time period that overlaps with the valid event time. An updated user profile record is created based, at least in part, on the event. The updated user profile record is saved with the valid event time demarcating the start of a profile valid time period. The prior user profile with the valid event time demarcating the end of the profile record valid time period is also saved for subsequent processing.
摘要:
Systems, methods, and other embodiments associated with bi-temporal user profiling are described. An event is detected that occurs at a valid event time. In response to the event, a repository is accessed that stores data describing one or more user profiles that include a profile record valid time period specifying a time at which the given profile record is valid. A prior user profile record is retrieved that has a profile record valid time period that overlaps with the valid event time. An updated user profile record is created based, at least in part, on the event. The updated user profile record is saved with the valid event time demarcating the start of a profile valid time period. The prior user profile with the valid event time demarcating the end of the profile record valid time period is also saved for subsequent processing.
摘要:
Apparatus, methods, and computer program products are disclosed that determine Rights to an entity. The disclosed technology maintains data structures representing a set of entities. These entities include protected-entities and sensitivity-entities. Each of the sensitivity-entities is associated with a respective sensitivity access-control-list. The sensitivity-entities include a first sensitivity-entity that is associated with a first sensitivity-access-control-list. A first protected-entity being one of one or more of the protected-entities associated with the first sensitivity-entity. The technology evaluates Rights to the first protected-entity with respect to the first sensitivity-access-control-list and enables access to the first protected-entity responsive to the Rights evaluation and presents the first protected-entity when access is enabled.
摘要:
Apparatus, methods, and computer program products are disclosed that determine an actor context of an actor as well as an access environment for an attempted operation responsive to the actor context and a necessary condition. The method also evaluates whether the access environment satisfies the necessary condition and activates a principal responsive to the evaluation and authenticates the actor against the principal.
摘要:
Apparatus, methods, and computer program products are disclosed that determine Rights to an entity. The disclosed technology maintains data structures representing a set of entities. These entities include protected-entities and sensitivity-entities. Each of the sensitivity-entities is associated with a respective sensitivity access-control-list. The sensitivity-entities include a first sensitivity-entity that is associated with a first sensitivity-access-control-list. A first protected-entity being one of one or more of the protected-entities associated with the first sensitivity-entity. The technology evaluates Rights to the first protected-entity with respect to the first sensitivity-access-control-list and enables access to the first protected-entity responsive to the Rights evaluation and presents the first protected-entity when access is enabled.
摘要:
Apparatus, methods, and computer program products are disclosed that determine an actor context of an actor as well as an access environment for an attempted operation responsive to the actor context and a necessary condition. The method also evaluates whether the access environment satisfies the necessary condition and activates a principal responsive to the evaluation and authenticates the actor against the principal.