摘要:
Embodiments of the present invention address deficiencies of the art in respect to access control and provide a method, system and computer program product for access control management for a collection of heterogeneous application components. In a first embodiment, a data processing system for role-based access control management for multiple heterogeneous application components can include at least one business role descriptor associating a business role with multiple, different application roles for corresponding, disparate application components. The system also can include at least one access policy associating a user with the business role. Finally, the system can include policy deployment logic include program code enabled to process the access policy to assign the user to the different application roles in the disparate application components.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to access control and provide a method, system and computer program product for access control management for a collection of heterogeneous application components. In a first embodiment, a data processing system for role-based access control management for multiple heterogeneous application components can include at least one business role descriptor associating a business role with multiple, different application roles for corresponding, disparate application components. The system also can include at least one access policy associating a user with the business role. Finally, the system can include policy deployment logic include program code enabled to process the access policy to assign the user to the different application roles in the disparate application components.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to access control and provide a method, system and computer program product for access control management for a composite application. In a first embodiment, a method for role-based access control management for a composite application can be provided. The method can include selecting a component for deployment in a composite application and parsing a security policy for the component to identify a mapping between a specific role for the component and a virtual role for the composite application. Binding logic can be generated from the security policy and the component can be deployed into the composite application. Finally, security access operations for the virtual role can be processed through method calls to operations defined in the binding logic.
摘要:
Methods, systems, and computer program products are disclosed for securing access to a service data object that include providing a service data object having an embedded security policy, and enforcing by the object the security policy of the object. Securing access to a service data object may include establishing a trust relationship with a trusted environment, transmitting the object to the trusted environment, and enforcing by the object the security policy of the object in the trusted environment. Securing access to a service data object may include exposing an interface to provide access to the object in dependence upon an authorization policy of the security policy for an authenticated user. Securing access to a service data object may include exposing attributes of the object in dependence upon an authorization policy of the security policy for an authenticated user.
摘要:
A method, system and computer-usable medium are disclosed for managing the evolution of a data model through the application of change statements. Each change statement comprises a change operator operable to perform change operations on the elements of a target data model. The change statements are appended to a data model change stack. Execution of the change statements stored in the data model change stack results in change operations being performed on the target data model. Each change statement is associated with a version ID and a timestamp which identify the scope of the data model version and time instance of the change.
摘要:
A method for facilitating in assessing transitional costs in business transformations using a computer-aided organizational design system is provided. The method comprises creating a first organization design model representative of the current organizational design state of an organization using a graphical tool. The method further comprises changing the first organization design model into a second organization design model representative of the organizational design state of the organization after the business transformation. The method further comprises generating a report identifying the transition cost factors and the transition cost of moving from the first organization design model to the second organization design model, wherein the transition cost is determined based on predetermined calculation algorithms or heuristics.
摘要:
A method for managing communication between a client process and a server process in a distributed computing environment, the client process residing on a host computer that is connected to a physical network having a transport layer and a network layer. The method begins when the client process makes a remote procedure call by detecting whether a server process identified by the remote procedure call is located on the host computer. If so, a binding handle vector is returned to the client process. The protocol sequence in the binding handle is mapped to a second protocol sequence that establishes an interprocess communication path between the client and server processes instead of a path through the transport and network layers of the physical network. The remote procedure call is then executed, preferably by using a send and receive messaging facility of the host computer operating system.
摘要:
The disclosed techniques enable a customer or solution provider to generate customer-specific solution documentation according to an organizational design corresponding to a customer from generic, or “out-of-the-box,” documentation. A solution package includes an assumed, out-of-box organizational design, out-of-box solution documentation and solution materials. A customer or information technology (IT) integrator is provided a graphical user interface (GUI) to edit the out-of-box organizational design to conform to the customer's organizational design. A Documentation Generation and Delivery Tool (DGDT) analyzes both organizational and documentation designs. The DGDT generates and delivers customer-specific documentation based upon out-of-box documentation and customer-specific organizational design. The DGDT also provides a GUI for human interaction. The disclosed techniques may be employed to build dynamic documentation in areas such as, but not limited to, software product info centers, IT solutions, service methods and specific business processes.
摘要:
A method, system and computer-usable medium are disclosed for managing the evolution of a data model through the application of change statements. Each change statement comprises a change operator operable to perform change operations on the elements of a target data model. The change statements are appended to a data model change stack. Execution of the change statements stored in the data model change stack results in change operations being performed on the target data model. Each change statement is associated with a version ID and a timestamp which identify the scope of the data model version and time instance of the change.
摘要:
A client process resides on a host computer within a distributed data processing system, and the client process requests a remote procedure call for a service procedure. A binding handle of a server process is obtained; a determination is made as to whether the binding handle of the server process points to the client process; and in response to a determination that the binding handle of the server process points to the client process, a positive indication is generated that the service procedure is provided by the client process. In response to a determination that the service procedure is provided by the client process, the service procedure is called using a local procedure call after obtaining a local address for the function within the client process by looking up the service procedure in an interface registry.