摘要:
An externalized entitlement management system comprises a policy administration point that is configured to receive one or more definitions or updates of entitlement policies specifying subjects, actions, and resources, and to update a first entitlement repository coupled to the policy administration point with the definitions or updates in response to receiving the definitions or updates; one or more policy decision points that are coupled to the policy administration point over a network; one or more policy enforcement points that are integrated into one or more respective first application programs, wherein each of the policy enforcement points is coupled to one of the policy decision points; and one or more action handlers in the policy administration point, wherein each of the action handlers is configured to intercept a particular action represented in an update to an entitlement policy, to transform the action into an entitlement update in a form compatible with a native entitlement mechanism of a second application program that does not have one of the policy enforcement points, to send the transformed entitlement update to the second application program, and to cause a rollback of the update of the first entitlement repository if the second application program fails to implement the entitlement update in the native entitlement mechanism.
摘要:
An integrated development environment (IDE) includes a runtime environment and user interface. A user of the IDE specifies an application component to be monitored, and metrics for the specified application component are transmitted by the IDE runtime environment to a data collector belonging to the IDE user interface for display to the user. In addition, support is offered for the separation of operational concerns from business logic, allowing developers to control the operational aspects from a policy manager of the IDE user interface. Using the policy manager, developers invoke policy agents to add predefined code segments to applications, saving the developer from having to recode the same operational logic each time an application is updated to contain a new policy related to business logic.
摘要:
An externalized entitlement management system comprises a policy administration point that is configured to receive one or more definitions or updates of entitlement policies specifying subjects, actions, and resources, and to update a first entitlement repository coupled to the policy administration point with the definitions or updates in response to receiving the definitions or updates; one or more policy decision points that are coupled to the policy administration point over a network; one or more policy enforcement points that are integrated into one or more respective first application programs, wherein each of the policy enforcement points is coupled to one of the policy decision points; and one or more action handlers in the policy administration point, wherein each of the action handlers is configured to intercept a particular action represented in an update to an entitlement policy, to transform the action into an entitlement update in a form compatible with a native entitlement mechanism of a second application program that does not have one of the policy enforcement points, to send the transformed entitlement update to the second application program, and to cause a rollback of the update of the first entitlement repository if the second application program fails to implement the entitlement update in the native entitlement mechanism.
摘要:
An integrated development environment (IDE) includes a runtime environment and user interface. A user of the IDE specifies an application component to be monitored, and metrics for the specified application component are transmitted by the IDE runtime environment to a data collector belonging to the IDE user interface for display to the user. In addition, support is offered for the separation of operational concerns from business logic, allowing developers to control the operational aspects from a policy manager of the IDE user interface. Using the policy manager, developers invoke policy agents to add predefined code segments to applications, saving the developer from having to recode the same operational logic each time an application is updated to contain a new policy related to business logic.
摘要:
A system and a method for policy management in a web services environment includes a policy design tool, a policy storage and a policy manager controller. The policy design tool creates (or updates) a policy for association with a web service. The policy storage stores the policy. The policy manager controller provides an interface for transmission of the policy to a policy enforcement tool and also receives messages relating to the policy from the policy enforcement tool. In addition, a system and method for policy enforcement in a web services environment includes a policy enforcement controller, a policy enforcement repository, an enforcer, a policy enforcement framework, and a policy container. The policy enforcement controller receives and commits a policy and the policy enforcement repository stores the committed policy. The enforcer module receives a request to invoke the policy and the policy enforcement framework determines whether the requested policy is committed in the policy enforcement repository and whether the policy is instantiated. The policy container determines whether the policy is enforceable.
摘要:
A bundle of drawn fibers that have X-ray scintillating unagglommerated nanocrystallite particles in plastic or glass cores of down to 0.1 micron spacing and claddings of X-ray absorbing compounds in the cladding composition. Optional is a cover to the bundle that blocks light from leaving the bundle at the X-ray side while allowing X-rays to pass into the cores. To image the light exiting the fiber bundle at the sub-micron level, light expansion is preferable using either a lens system or a fiber bundle expander.
摘要:
A method for look-ahead load pre-fetching that reduces the effects of instruction stalls caused by high latency instructions. Look-ahead load pre-fetching is accomplished by searching an instruction stream for load memory instructions while the instruction stream is stalled waiting for completion of a previous instruction in the instruction stream. A pre-fetch operation is issued for each load memory instruction found. The pre-fetch operations cause data for the corresponding load memory instructions to be copied to a cache, thereby avoiding long latencies in the subsequent execution of the load memory instructions.
摘要:
A system and method for determining the temporal resolution of a tomographic imaging device uses an apparatus to drive one or more dynamic phantoms composed of multiple materials. The apparatus is placed at or near the isocenter of the imaging device and the one or more phantoms are moved to produce a plurality of dynamic features, each having a specified frequency. The dynamic features are imaged with the device and the acquired image data corresponding to the dynamic features is analyzed to determine a temporal modulation transfer value at each of the known specified frequencies. The temporal resolution of the imaging device is determined using these temporal modulation transfer values.
摘要:
A system and a method for policy management in a web services environment includes a policy design tool, a policy storage and a policy manager controller. The policy design tool creates (or updates) a policy for association with a web service. The policy storage stores the policy. The policy manager controller provides an interface for transmission of the policy to a policy enforcement tool and also receives messages relating to the policy from the policy enforcement tool. In addition, a system and method for policy enforcement in a web services environment includes a policy enforcement controller, a policy enforcement repository, an enforcer, a policy enforcement framework, and a policy container. The policy enforcement controller receives and commits a policy and the policy enforcement repository stores the committed policy. The enforcer module receives a request to invoke the policy and the policy enforcement framework determines whether the requested policy is committed in the policy enforcement repository and whether the policy is instantiated. The policy container determines whether the policy is enforceable.
摘要:
Embodiments of the present invention include a system and method for making it safe to execute downloaded code. The method includes accessing an application, the application making a system call to a library of a computer system for a resource, establishing a requesting thread. The method further includes the library sending a request message to a local security filter; the local security filter validating the requesting thread and returning a digital signature, that uniquely identifies the requesting thread, to the application. The application making a system call to a kernel of the computer system wherein the kernel uses the digital signature from the security filter to validate the requesting thread before allowing access to the requested resource.