摘要:
Distributed computing systems having mechanisms for efficiently coordinating transactions between nodes in the system are provided. One or more nodes may negotiate maximum time periods in which to communicate with each other or a transaction coordinator. A node is determined to be non-responsive when the time since a last communication exceeds the maximum time period. The maximum time period may include an adjustment for the latency of at least a portion of the distributed computing system.
摘要:
Distributed computing systems having mechanisms for efficiently coordinating transactions between nodes in the system are provided. One or more nodes may negotiate maximum time periods in which to communicate with each other or a transaction coordinator. A node is determined to be non-responsive when the time since a last communication exceeds the maximum time period. The maximum time period may include an adjustment for the latency of at least a portion of the distributed computing system.
摘要:
Several embodiments disclosed herein are directed to methods, computer program products, and systems configured to track operation dependencies. For example, in one embodiment, at a first entity, a first identifier corresponding to a first operation is accessed. For a second operation occurring as a result of the first operation, a second identifier is generated. A directed event including the first and second identifiers is emitted. The directed event is logged. The second identifier is sent to a second entity. An operation call for the second operation is also sent to the second entity. The second identifier is made available at the second entity for use in creating directed events for subsequent operations occurring as a result of the second operation.
摘要:
Directly operating on data structures in a generic manner regardless of the type of data structure being operated upon and without requiring dedicated executable code for manipulating data structures of the particular data type. A common set of commands (e.g., insert, delete, replace, update, query) are recognized that may be used to operate on data structures of a number of different data types. A navigation module accesses a request to execute one of the common command methods on at least an identified portion of an identified data structure. Then, the navigation module accesses a navigation assistance module to access a set of rules associated with the particular data type, the set of rules allowing the navigation module to find the portion of the data structure that is to be operated on. If appropriate, the command operation is then executed on the identified portion of the data structure.
摘要:
The embodiments described herein generally relate to a method and system of injecting repeatable processes, or workflows, into the processing of data-oriented or procedural requests in an entity management system. A request in such a system is subject to authentication, authorization, and action phases of processing, and workflows may be associated with each phase for automatic processing upon the triggering of a certain request under particular circumstances. A declarative mapping associates workflows with the request type, phase, requester, and target. The mapping may be created at the system administrator level, or by any person with the necessary capabilities, through the application of the processing concept in API or UI and may be consulted and invoked upon receipt of a request matching the mapping's criteria. Mappings may also be created and retrieved to manage state changes resulting from processing in other phases of the request processing model.
摘要:
A web service includes a protected resource. A requester requests access to the protected resource by sending a request to the web service. The web service prevents access to the web service until the request has been authorized by an authorizer. After the request has been authorized by the authorizer, the web service allows the requester to access the protected resource.
摘要:
Resources are partitioned via a virtual partitioning system to distribute the resources over a plurality of resource servers. A virtual partition table can be kept at each of a set of resource managers handling requests for resources in tandem. When a resource is requested, a virtual partition value is calculated algorithmically, and the value is mapped to a resource component via the virtual partition table. The resource component encapsulates information indicating on which of the resource servers the resource resides and can provide a component for performing operations on the resource even though the requestor does not have information about where the resource resides. The resources can be repartitioned by modifying the virtual partition table, thus allowing the addition of additional resource servers to the system while the resources remain available. Additional resource types can be added without reengineering the system.
摘要:
The intuitive display of trace historical data in a manner that processing control transfer between processing entities is represented in the context of trace data from multiple processing entities. For each processing entity, a set of one or more trace entries are identified for that processing entity and displayed in a manner that the trace entries for the processing entity are shown associated with the processing entity. The transfer of control between processing entities is also shown in a manner that illustrates a transfer of processing control.
摘要:
Defining a unified access management policy expression that unifies access control policy with events or workflows. Unified management policy information is stored. The unified management policy information defines permissions for access to resources together with events or workflows. A request is received to execute the one or more operations on one or more objects. The requested operation is verified against the unified management rules. Verifying includes performing a single retrieval, retrieving both the access control information and the events or workflows and calculating the applicability of the rule to the conditions represented by the request. Matching rules are applied, access control decisions performed and associated workflows are executed.
摘要:
Enforcing access control based on resource state. A method includes receiving a request for an operation on one or more objects stored on computer readable media. One or more pre-operation states of the one or more objects are determined. One or more post-operation states of the one or more objects are determined. One or more access control rules are referenced. The access control rules control access to resources based on pre-operation state and post operation state. It can then be determined that the one or more access control rules allow the operation to succeed based on the one or more pre-operation states and the one or more post operation states. Based on determining that the one or more access control rules allow the operation to succeed, the operation is allowed to succeed.