OPTIMIZING CLOUD SERVICE DELIVERY WITHIN A CLOUD COMPUTING ENVIRONMENT
    1.
    发明申请
    OPTIMIZING CLOUD SERVICE DELIVERY WITHIN A CLOUD COMPUTING ENVIRONMENT 审中-公开
    在云计算环境中优化云服务交付

    公开(公告)号:WO2011067099A3

    公开(公告)日:2011-08-25

    申请号:PCT/EP2010067505

    申请日:2010-11-15

    CPC classification number: G06F9/5072 G06F2209/5015 H04L67/327

    Abstract: The present invention provides a system or method to provide dynamically packaged Cloud services to customers via a Cloud services registry. The Cloud services registry is dynamic and operates by polling different Cloud service providers and Cloud service databases to ensure that the Cloud services registry is up to date with the latest available Cloud services. The Cloud services registry is available for queries from Cloud customers and abstracts multiple Cloud service providers. By abstracting the Cloud services, the dynamic Cloud services registry creates a modular package of different services from different Cloud service providers based on the query and requested priority for services. The dynamic Cloud registry is dynamically updated based on the level of services that the provider has available. The dynamic registry determines what service best matches the requirements from a Cloud service request (CSR) and returns a personalized set of matching services.

    Abstract translation: 本发明提供了一种通过云服务注册表向客户提供动态打包的云服务的系统或方法。 云服务注册表是动态的,通过轮询不同的云服务提供商和云服务数据库来运行,以确保云服务注册表与最新的可用云服务保持同步。 云服务注册表可用于来自云客户的查询并提取多个云服务提供商。 通过抽象云服务,动态云服务注册中心根据查询创建了来自不同云服务提供商的不同服务的模块化包,并请求服务优先级。 动态云注册表根据提供者可用的服务级别动态更新。 动态注册表确定哪些服务最符合来自云服务请求(CSR)的要求并返回一组个性化的匹配服务。

    SYSTEM AND METHOD FOR TRACKING THE SECURITY ENFORCEMENT IN A GRID SYSTEM

    公开(公告)号:CA2650463C

    公开(公告)日:2014-04-08

    申请号:CA2650463

    申请日:2007-06-19

    Applicant: IBM

    Abstract: The "Grid Security Monitor" tracks the security status of resources in a grid computer system. When a client submits a job to the grid scheduler, the Grid Security Monitor creates a security contract. The security contract comprises all the security credentials needed to access the resource executing the job, as well as privacy and security requirements. The Grid Security Monitor compares the security status of the resource to the requirements of the security contract. If the security status of the resource changes or violates the security contract, then the Grid Security Monitor notifies the client. The Grid Security Monitor has a user interface that allows the client to perform a manual security validation by asking the grid management system to verify the security status of the resource.

    SMART CARD DATA TRANSACTION SYSTEM AND METHODS FOR PROVIDING STORAGE AND TRANSMISSION SECURITY

    公开(公告)号:CA2568990C

    公开(公告)日:2011-09-27

    申请号:CA2568990

    申请日:2004-05-28

    Applicant: IBM

    Abstract: A smart card system is disclosed for secure transmission of post issuance data to a embedded chip using a chip relay module, a plurality of hardware security modules, a first communication system having two security layers and a second communication system having four security layers. The first communication system may be considered a server side system and comprises a chip management system, a security server having a first hardware security module, a distribution server having a second hardware security module and a computer system connected by a network. The first communication system has a first security layer and a second security layer. The first security layer comprises mutual authentication that makes each component of the first communication system a trusted node to the others through client mutual authentication. The second security layer comprises system keys for secure communication between the hardware security modules. The second communication system may be considered a client side system and comprises the computer system connected to the distribution server by a network, a PC/SC card reader driver, a Web browser application, and a chip relay module and is for secure communication between the distribution server and the chip of a smart card inserted in the card reader/writer. The second communication system has a third, fourth, fifth and sixth security layer.

    SYSTEM AND METHOD FOR TRACKING THE SECURITY ENFORCEMENT IN AGRID SYSTEM

    公开(公告)号:CA2650463A1

    公开(公告)日:2007-12-27

    申请号:CA2650463

    申请日:2007-06-19

    Applicant: IBM

    Abstract: The “Grid Security Monitor” tracks the security status of resources in a grid computer system. When a client submits a job to the grid scheduler, the Grid Security Monitor creates a security contract. The security contract comprises all the security credentials needed to access the resource executing the job, as well as privacy and security requirements. The Grid Security Monitor compares the security status of the resource to the requirements of the security contract. If the security status of the resource changes or violates the security contract, then the Grid Security Monitor notifies the client. The Grid Security Monitor has a user interface that allows the client to perform a manual security validation by asking the grid management system to verify the security status of the resource.

Patent Agency Ranking