Abstract:
Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. At least one service of the plurality of services is invoked. State information is associated with the at least one service invoked. The state information is used to authenticate a client with at least one service. Further, a method for access control in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. A rule specification language is provided. At least one rule is specified using the rule specification language. A verification is performed to determine whether or not the client satisfies the at least one rule. The client is granted access to a service when the client satisfies the at least one rule.
Abstract:
Techniques are disclosed for generation and refinement of service descriptions based on records of invocations of the services, i.e., service description refinement based on actual service use. For example, a method for describing one or more services in a service-oriented environment comprised of one or more clients invoking the one or more services comprises the following steps. An initial description is established for at least one of the one or more services. Information is collected from one or more service invocations including at least one of a client identity, a value of at least one parameter, a return value, and an execution time. The information is analyzed to refine the description.
Abstract:
Techniques are disclosed for generation and refinement of service descriptions based on records of invocations of the services, i.e., service description refinement based on actual service use. For example, a method for describing one or more services in a service-oriented environment comprised of one or more clients invoking the one or more services comprises the following steps. An initial description is established for at least one of the one or more services. Information is collected from one or more service invocations including at least one of a client identity, a value of at least one parameter, a return value, and an execution time. The information is analyzed to refine the description.
Abstract:
Techniques are disclosed for adaptively determining trust in client-server environments. By way of example, a method for assigning a trust level to a client in a client-server environment including at least one client communicating with a plurality of servers includes the following steps. Information associated with a server s1 and a server s2 different from s1 is obtained regarding a request r1 sent by a client and received by s1 and a request r2 sent by the client and received by s2. The obtained information is utilized to assign at least one trust level to the client.
Abstract:
An information-handling system operable within a distributed object computing environment (DOCE) is disclosed that includes an object-based program for controlling object searching in a constraint-based filtering mode over said DOCE. The object-based program for controlling object searching further comprises means for providing hierarchical storage of a name/binding value during a search. Additionally, the object-based program includes a means for providing the addition of properties as name/value pair sequence to each node within a tree search performed by the object-based program. Further, the search mechanism includes means for providing recursive searching of the group properties as well as means for providing meta-knowledge of the class within the DOCE for attribute search. Moreover, the system includes means for invoking a base-filterable class, which introduces methods that verify whether an object satisfies a given filter, and where the base-filterable class further provides a filterable subclass that provides the methods needed to build a filter.
Abstract:
Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. At least one service of the plurality of services is invoked. State information is associated with the at least one service invoked. The state information is used to authenticate a client with at least one service. Further, a method for access control in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. A rule specification language is provided. At least one rule is specified using the rule specification language. A verification is performed to determine whether or not the client satisfies the at least one rule. The client is granted access to a service when the client satisfies the at least one rule.
Abstract:
Techniques for maintaining consistent replicas of data are disclosed. By way of example, a method for managing copies of objects within caches, in a system including multiple caches, includes the following steps. Consistent copies of objects are maintained within the caches. A home cache for each object is maintained, wherein the home cache maintains information identifying other caches likely containing a copy of the object. In response to a request to update an object, the home cache for the object is contacted to identify other caches which might have copies of the object.
Abstract:
Techniques are disclosed for adaptively determining trust in client-server environments. By way of example, a method for assigning a trust level to a client in a client-server environment including at least one client communicating with a plurality of servers includes the following steps. Information associated with a server s1 and a server s2 different from s1 is obtained regarding a request r1 sent by a client and received by s1 and a request r2 sent by the client and received by s2. The obtained information is utilized to assign at least one trust level to the client.
Abstract:
Deploying a set of virtual software resource templates to a plurality of nodes is provided. The process identifies a set of virtual machine images and metadata to form a set of virtual software resource templates. The process creates a model that indicates a performance metric based on a number of nodes on which a number of virtual machine images is deployed. The process receives a quality of service requirement. The process determines, using the model, a sufficient number of virtual software resource templates in the set of virtual software resource templates and a sufficient number of nodes in the plurality of nodes to fulfill the quality of service requirement. The process deploys the sufficient number of virtual software resource templates on the sufficient number of nodes using the metadata.
Abstract:
Techniques for maintaining consistent replicas of data are disclosed. By way of example, a method for managing copies of objects within caches, in a system including multiple caches, includes the following steps. Consistent copies of objects are maintained within the caches. A home cache for each object is maintained, wherein the home cache maintains information identifying other caches likely containing a copy of the object. In response to a request to update an object, the home cache for the object is contacted to identify other caches which might have copies of the object.