Abstract:
In order to provide protection for an application against attacks, a method is provided which defends a computer program independently of the complexity of the program. A request to invoke the application is received (1110). A process execution state is set (405) to indicate a first execution. The application is executed (420; 520; 1120) in response to the request, and application data and control information calculated by the application is stored (420, 520) while the application is executed. The process execution state is set (405, 1130) to indicate a subsequent execution. At least part of the application is executed (1140) for at least one subsequent time. Application data and control information calculated by the application during subsequent executions is compared (430; 530; 1210; 1310) with the data/information stored during first execution. The comparison is done by operation system services which are responsive to the process execution state. When the comparison shows a discrepancy in the compared application data and control information, appropriate error handling takes place.
Abstract:
Die Erfindung stellt ein Verfahren und ein System zum Optimieren des Platzierens von Instanzen der Abbilder (103) virtueller Maschinen in einer Cloud-Computing-Umgebung bereit. Das Verfahren umfasst die Schritte zum Empfangen einer Anforderung zum Nutzen einer neuen Instanz eines VM-Abbilds; Lesen von benutzerspezifischen und allgemeinen VM-Ressourcen-Nutzungsprofilen, die erste Ressourcen-Inanspruchnahmedaten umfassen; Lesen von Ressourcen-Poolprofilen, die zweite Ressourcen-Inanspruchnahmedaten umfassen; für jedes der Ressourcen-Poolprofile Analysieren und Angleichen des gelesenen VM-Ressourcen-Nutzungsprofils an die gelesenen Ressourcen-Poolprofile, Berechnen eines kumulierten Ressourcen-Inanspruchnahmeprofils und Ermitteln des einen der mehreren Ressourcen-Pools, der die geringste kumulierte Ressourcen-Inanspruchnahme aufweist.
Abstract:
A computer-implemented method for controlling state updates in a cloud service environment may be provided. The method includes maintaining a set of state provider definitions, wherein each state provider definition comprising a set of required input variable definitions, a set of output variable definitions and related metadata. The method also includes determining a set of input variable definitions required by an invoked service, receiving the determined set of input variable definitions by the state provider management service, selecting a state provider definition, wherein the selected state provider definition is to be compatible with the received set of input variable definitions, determining a set of matching state provider services matching the selected state provider definition, scoring the determined set of state provider services, invoking the highest scoring state provider service, and passing the state data to the invoked service.
Abstract:
Techniques for privacy centric data security. A request to permit a data processor to access private data associated with a user is received at a cloud data privacy service. The request includes a request for a data access block relating to the private data, and a data filter describing one or more access parameters. The cloud privacy data service generates the first data access block, based on the private data and the data filter. The first data access block is transmitted from the cloud privacy service to a user device, which is configured to transmit the first data access block to the first data processor. The cloud data privacy service receives a request for the private data that includes the first data access block. The cloud data privacy service determines that the first data access block is valid, and grants the first data processor access to the private data.
Abstract:
EEPROM data files are managed in order to restore data after abortion of a write operation, where data is stored in a record-oriented data structure with each of the records containing a status byte along with the data contents. All of the data files affected by the write operation contain either all of the data stored prior to the write operation, or all of the data as modified subsequent to the write operation. Each file is retained as active data, in case of a power failure, until all files have been successfully updated according to write operation. Independent claims are included for; (a) a system for managing EEPROM data files; and (b) a computer program product
Abstract:
Ein durch einen Computer ausgeführtes Verfahren kann bereitgestellt werden, um Zustandsaktualisierungen in einer Cloud-Service-Umgebung zu steuern. Das Verfahren weist ein Verwalten eines Satzes von Zustandsanbieterdefinitionen auf, wobei jede Zustandsanbieterdefinition einen Satz von erforderlichen Eingabevariablendefinitionen, einen Satz von Ausgabevariablendefinitionen sowie zugehörige Metadaten aufweist. Das Verfahren umfasst auch ein Feststellen eines Satzes von Eingabevariablendefinitionen, die von einem aufgerufenen Service benötigt werden, ein Empfangen des festgestellten Satzes von Eingabevariablendefinitionen durch den Zustandsanbieter-Verwaltungsservice, ein Auswählen einer Zustandsanbieterdefinition, wobei die ausgewählte Zustandsanbieterdefinition mit dem empfangenen Satz von Eingabevariablendefinitionen kompatibel sein soll, ein Feststellen eines Satzes von entsprechenden Zustandsanbieter-Services, die der ausgewählten Zustandsanbieterdefinition entsprechen, ein Bewerten des festgestellten Satzes von Zustandsanbieter-Services, ein Aufrufen des Zustandsanbieter-Service mit der höchsten Bewertung, und ein Übergeben der Zustandsdaten an den aufgerufenen Service.
Abstract:
Optimised placement of virtual machine (VM) images in cloud computing environments, comprising: receiving user request for deploying and indicating new VM-image; reading VM resource usage profiles (user-specific if available) comprising first consumption data over first time period 303; reading resource pool profile comprising second resource consumption data over second time period 302; for each of the resource-pool profiles, aligning the read VM and resource-pool usage profiles, calculating an aggregated resource consumption profile 301 predictive of total resource consumption; and determining resource pools having the least aggregated consumption. Pool with least resource usage can have lowest integral resource consumption value of the aggregated not exceed threshold 306. User specific profile comprises rules for guaranteeing accordance with service level agreement. Advantages comprise: instantiation of VM-instances at future times when they are needed even if they cannot be provided at current time; automatic, dynamic instantiation of VM-instances adapted to changing workloads of resource-pool.