-
公开(公告)号:GB2578066A
公开(公告)日:2020-04-15
申请号:GB202000336
申请日:2018-06-18
Applicant: IBM
Inventor: CONSTANTIN MIRCEA ADAM , MAJA VUKOVIC , JINHO HWANG , SHRIPAD NADGOWDA , NIKOLAOS ANEROUSIS
IPC: G06F11/30 , G06F15/177
Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.
-
公开(公告)号:GB2578066B
公开(公告)日:2022-02-16
申请号:GB202000336
申请日:2018-06-18
Applicant: IBM
Inventor: CONSTANTIN MIRCEA ADAM , MAJA VUKOVIC , JINHO HWANG , SHRIPAD NADGOWDA , NIKOLAOS ANEROUSIS
IPC: G06F11/30 , G06F15/177 , G06F21/57
Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.
-
公开(公告)号:GB2550786A
公开(公告)日:2017-11-29
申请号:GB201713410
申请日:2016-02-01
Applicant: IBM
Inventor: VUGRANAM SREEDHAR , MILTON HERNANDEZ , CONSTANTIN MIRCEA ADAM , PREMA VIVEKANANDAN
Abstract: A method forms a key pair for a user. The key pair has a public key and a private key that is unique to the user and that is encrypted using a passphrase formed from an enterprise password of the user and an identification that uniquely identifies in the enterprise a device by which the user gains access. The method stores the private key in the user device and stores the public key in an enterprise server that is accessed by the user. The method provides the private key from the user device to a client, such as a SSH client, in conjunction with the password and the identification, decrypts the private key to obtain the decrypted password and the identification, and allows the user to access the enterprise server only if the decrypted password and the identification match the password and the identification provided with the private key.
-
-