Abstract:
A method, apparatus, and computer instructions for obtaining a logical unit. A request is sent for the logical unit. In the depicted examples, the request is sent to a multicast IP address. Responses to the request for the logical unit are received from a number of responders. A responder is identified from the set of responders to form a selected responder. The selected responder is identified based on at least one connection metric between the data processing system and the set of responders. The logical unit is retrieved from the selected responder.
Abstract:
A method, apparatus, and computer instructions for authorizing execution of an application on the data processing system. A request is received to execute the application, wherein the request originates from a remote data processing system and wherein the request includes a digital certificate and the application. The digital certificate is verified in response to receiving the request. Responsive to verifying the digital certificate, a digital digest is calculated for the application to form a calculated digital digest. The calculated digital digest is compared with a set of digital digests from a trusted source. The application is executed if a match between the calculated digital digest and set of digital digests occurs.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for configuring a set of devices relating to a prescribed machine connected to a storage area network. SOLUTION: Initial program load firmware and network adapter firmware of each machine on the storage area network are modified to query a storage area network appliance for lists of devices. The storage area network appliance can be identified by a world wide name and can store lists of boot devices, root volume group devices, primary devices, and secondary devices for each machine on the storage area network. The storage area network appliance waits for reception of a query and returns the appropriate list of devices on the basis of the query type and/or boot type. The boot type for a machine can be set to normal boot, maintenance boot, or installation boot. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method and device for obtaining status information about an active process in a grid and to provide a computer instruction. SOLUTION: A job identifier is received from a remote node in response to the submission of a job to the remote node on the grid from a data processing system. The job identifier is stored in a set of job identifiers. The set of job identifiers is used to form a set of job status request in response to a request of obtaining the status of the job submitted from the data processing system, and a job status request is submitted for each job identifier in one job identifier about the active process. A response to one set of job status requests is received, and the response is then presented. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
"extensão de segurança de rede de sistemas de arquivos distribuídos". um protocolo de segurança que dinamicamente implementa segurança de montagem aumentada de um sistema de arquivos, quando o acesso a arquivos sensíveis em uma rede de sistema de arquivos é solicitado. quando o usuário de um sistema cliente tenta acessar um arquivo sensível especificamente etiquetado, o servidor que hospeda o sistema de arquivos executa um código de software que termina a montagem corrente e reconfigura as portas do servidor para aceitar uma remontagem a partir do cliente através de uma porta mais segura. a porta do servidor reconfigurada é fornecido o endereço de ip do cliente e a correspondência do endereço de ip durante a operação de remontagem. a comutação para uma montagem segura é completada de uma maneira perfeitamente consistente de modo que os usuários autorizados são permitidos acessar arquivos sensíveis sem derrubar o servidor com as a criptografação custosa e outras características de segurança de intensivo recurso. nenhum retardo significante é experimentado pelo usuário, enquanto o arquivo sensível é protegido de captura não autorizada durante a transmissão do sistema cliente.
Abstract:
A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and re-configures the server ports to accept a re-mount from the client via a more secure port. The server re-configured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from un-authorized capture during transmission to the client system.
Abstract:
A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and reconfigures the server ports to accept a re-mount from the client via a more secure port. The server reconfigured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from unauthorized capture during transmission to the client system.
Abstract:
METHOD, APPARATUS, AND PROGRAM FOR PERFORMING BOOT, MAINTENANCE, OR INSTALL OPERATIONS ON A STORAGE AREA NETWORK A mechanism is provided for configuring a set of devices for a given machine attached to a storage area network (102). The initial program load firmware and network adapter firmware for each machine (104-108) on the storage area network (102) are modified to query a storage area network appliance (120) for lists of devices. The storage area network appliance (120) may be identified by a world wide name and may store lists of boot devices, root volume group devices, primary devices, and secondary devices for each machine on the storage area network. The storage area network appliance (120) then listens for queries and returns the appropriate list of devices based on query type and/or boot type. The boot type for a machine may be set to normal boot, maintenance boot, or install boot.
Abstract:
A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and re-configures the server ports to accept a re-mount from the client via a more secure port. The server re-configured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from un-authorized capture during transmission to the client system.
Abstract:
A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially- tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and reconfigures the server ports to accept a re-mount from the client via a more secure port. The server reconfigured server port is provided the IP address of the client and matche s the IP address during the re-mount operation. The switch to a secure mount i s completed in a seamless manner so that authorized users are allowed to acces s sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from unauthorized capture during transmission to the client system.