摘要:
A method correlates audit information in a multi-tenant computing infrastructure. The method leverages a user's authentication to the infrastructure, such as via federated single sign-on (F-SSO) from an identity provider. Preferably, the user's tenant identifier in the environment is derived based on identity information obtained during the F-SSO exchange. This tenant identifier is propagated to one or more other components in the infrastructure that are accessed by the user. As audit event from multiple components in the computing infrastructure are generated, these audit events are annotated with the tenant identifier and stored in an audit repository. In response to a request to view the tenant's audit data, a collection of tenant-specific audit events are then retrieved from the audit repository and displayed in a single tenant view. This approach ensures that audit event information is not leaked inadvertently between tenants.
摘要:
A method correlates audit information in a multi-tenant computing infrastructure. The method leverages a user's authentication to the infrastructure, such as via federated single sign-on (F-SSO) from an identity provider. Preferably, the user's tenant identifier in the environment is derived based on identity information obtained during the F-SSO exchange. This tenant identifier is propagated to one or more other components in the infrastructure that are accessed by the user. As audit event from multiple components in the computing infrastructure are generated, these audit events are annotated with the tenant identifier and stored in an audit repository. In response to a request to view the tenant's audit data, a collection of tenant-specific audit events are then retrieved from the audit repository and displayed in a single tenant view. This approach ensures that audit event information is not leaked inadvertently between tenants.
摘要:
An anomaly detection system for detecting an anomaly in a plurality of control systems comprises a plurality of analysis devices that are associated with the respective control systems and that acquire an event occurring in an associated control system and analyze the event to determine whether there is an anomaly. A first analysis device among the plurality of analysis devices determines whether an event occurring in the associated control system is to be indicated to a second analysis device among the plurality of analysis devices, and the second analysis device determines that there is an anomaly on condition that the event indicated by the first analysis device has correlation with an event indicated by an analysis device other than the first analysis device.
摘要:
A method and system for monitoring and judging activities in a virtual world environment are disclosed. The method comprises a first user engaging in an activity in the virtual world environment, a witness witnessing the first activity and reporting the activity to a monitor as possibly malicious, and the monitor organizing a jury comprised of a plurality of jurors. The jurors view and judge the activity in the virtual world environment; and on the basis of this judging, defined benefits in the virtual world environment are awarded to the witness, monitor and jurors. The method may further comprise penalizing the first user in the virtual world environment. For instance, if the first user has friends in the virtual world environment, the penalizing may include penalizing these friends.
摘要:
A medical guide service for a doctor, a patient, a general user, and a medical institution. The medical guide system may include a unit that creates medical record data and a unit that extracts the medical record data for each patient. The unit that extracts the medical record data uses examination data before a predetermined dividing point in a chronological order as before-dividing-point data and treatment data after the predetermined dividing point in the chronological order as after-dividing-point data. A unit extracts a treatment pattern from the after-dividing-point data. Another unit derives a rule that associates the examination results with the treatment pattern from the treatment pattern and the before-dividing-point data.
摘要:
In-development vulnerability response management, in one aspect, may detect a code instance that matches a vulnerability pattern; generate one or more hints associated with the code instance in response to the detecting; retrieve an action response to the code instance that matches a vulnerability pattern; and associate the retrieved action response with the code instance.
摘要:
A system and method classifies multiple pieces of private data owned by multiple entities according to data type. Each of the entities has an encryption key. A representative entity is selected that is representative of the entities owning data of the type. Data of each of the representative entity and a target entity is encrypted and the encrypted data is exchanged between the entities. Each piece of the encrypted data that the target entity has obtained is re-encrypted by using its own encryption key to obtain data 1, and the encrypted data that the representative entity has obtained is re-encrypted by using its own encryption key to obtain data 2. If data 1 of the representative entity matches data 2, it is determined that the representative entity and the target entity have data of an identical type.
摘要:
Statistical information about instance documents and schema information are used to integrate multiple state transitions that enable sectioning of a structure document, thereby generating an optimum automaton. In integrating state transitions, consecutively matching state transitions are held in the form of an ID list, which is then used to count the number of consecutive state transitions. Furthermore, patterns in the number of occurrences of repetitive elements including nested elements are statistically obtained. Variations of blanks in XML are addressed by using a statistical method. Schema information is used to build an automaton beforehand, thereby initialization overhead of the syntax parsing apparatus is reduced.
摘要:
Within exemplary embodiments of the present invention a solution is provided for the abbreviated parse scanning of a XML document, thus providing improved processing performance over traditional full parsing processing methods. As such, during an XML document parsing operation, from the start of the document to a specific segment of the document wherein desired information resides, only the minimal processing necessary is implemented to achieve a correct parse of the specified segment, wherein thereafter a full parse operation only for desired information is carried out over the specified segment in order to retrieve any desired information from the XML document.
摘要:
To perform processing at a high speed to identify some of the structure type definitions in a given definition set to which a received XML document matches. There are provided a decision rule generation section which generates a decision rule for determining to which one of a plurality of DTDs an XML document matches on the basis of unique elements of the DTDs, and a DTD determination section which determines to which one of the plurality of DTDs the XML document to be processed matches on the basis of the decision rule generated by the decision rule generation section.