Abstract:
PROBLEM TO BE SOLVED: To dynamically and adaptively manage security policies within a network. SOLUTION: Security policy repository houses security policies that are pushed over the network by a policy decision point PDP to appropriate security-enabled devices (policy enforcement points (PEPs)) for enforcement. Using a closed feedback loop, a policy feedback point (PEP) collects and processes data from intrusions, alerts, violations, and other abnormal behaviors from a variety of PEPs or logs produced from PEPs. This data is sent as feedback to the policy repository. The PDP detects the data and analyzes it to determine if policy updates (which can be dynamic and automatic) need to be adaptively made and dynamically pushed to PEPs. The PDP can also send console messages or alerts to consoles or administrators. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system, a device and a method, for effectively managing a subscription request for a network interface component. SOLUTION: The processor-based system includes: at least one processor, at least one memory coupled to the at least one processor, a network interface component, and a management controller. The management controller may be configured to receive information related to a subscription request for a virtual machine, generate configuration information for the network interface component based on the subscription request, and provide the configuration information to the network interface component. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To more efficiently and effectively protect software agents, in particular, critical software agents in a VT environment. SOLUTION: Methods and apparatuses for comparing a first security domain of a first memory page of a physical device to a second security domain of a second memory page of the physical device, with a plurality of security domains being stored in one or more registers of a processor of the physical device are included. Based on the comparison, the processor disallows an instruction from the first memory page to access the second memory page if a preferential domain of the first security domain is different from that of the second security domain. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
Apparatuses and methods for page coloring to associate memory pages with programs are disclosed. In one embodiment, an apparatus includes a paging unit and an interface to access a memory. The paging unit includes translation logic and comparison logic. The translation logic is to translate a first address to a second address. The first address is to be provided by an instruction stored in a first page in the memory. The translation is based on an entry in .a data structure, and the entry is to include a base address of a second page in the memory including the second address. The comparison logic is to compare the color of the first page to the color of the second page. The color o the first page is to indicate association of the first page with a first program including the first instruction. The data structure entry is also to include the color of the second page to indicate association of the second page with the first program or a second program.
Abstract:
In einer öffentlichen Cloud-Umgebung wird jede Arbeitslast eines Verbrauchers/Gasts in einem Serverspeicher eines Cloud-Dienst-Anbieters (Cloud Service Provider, CSP) unter Verwendung eines vom Verbraucher bereitgestellten Schlüssels, der der Arbeitslastverwaltungssoftware des CSP nicht bekannt ist, verschlüsselt. Ein verschlüsseltes Verbraucher-/Gastarbeitslastbild wird in den Serverspeicher des CSP an einem durch die Arbeitslastverwaltungssoftware des CSP spezifizierten Speicherort geladen. Basierend auf dem vom CSP bestimmten Speicherort bestimmt die Gastarbeitslast erwartete physische Hardwareadressen, in die Speicherabbildungsstrukturen und andere Typen von Verbraucherdaten geladen werden sollen. Diese erwarteten physischen Hardwareadressen werden durch die Gastarbeitslast in einer Speicherinhaberschaftstabelle (Memory Ownership Table, MOT) spezifiziert, die verwendet wird, um zu überprüfen, dass nachfolgende vom CSP bestimmte Speicherabbildungen wie erwartet sind. Speicherinhaberschaftstabelleneinträge können auch durch den vom Verbraucher bereitgestellten Schlüssel, der dem CSP nicht bekannt ist, verschlüsselt werden.
Abstract:
In an embodiment, a processor includes a binary translation engine to receive a code segment, to generate a binary translation of the code segment, and to store the binary translation in a translation cache, where the binary translation includes at least one policy check routine to be executed during execution of the binary translation on behalf of a security agent. Other embodiments are described and claimed.
Abstract:
In an embodiment, the present invention includes a processor having a decode unit and an execution unit. The decode unit is to decode control transfer instructions and the execution unit is to execute control transfer instructions, the control transfer instructions including a call instruction and a return instruction. The processor is to operate in a first mode in which the processor is to raise a fault if a next instruction to be executed immediately after the return instruction is not the call instruction.
Abstract:
In an embodiment, a method is provided. The method of this embodiment provides monitoring on a system flow statistics to identify one or more non-compliant traffic flows on the system, each of the one or more non-compliant traffic flows having packets; assigning a tag to each of the one or more non-compliant traffic flows, each of the tags corresponding to one of at least one congestion management policy; and applying one of the tags to each of the packets associated with any of the non-compliant traffic flows.
Abstract:
Los métodos y sistemas de ejemplo están dirigidos a reducir la latencia al proporcionar entornos de ejecución confiables (TEE). La inicialización de un TEE incluye varios pasos antes de que el TEE comience a ejecutarse. Además de la inicialización específica de la carga de trabajo, se realiza una inicialización independiente de la carga de trabajo, como agregar memoria al TEE. En entornos de función como servicio (FaaS), una gran parte del TEE es independiente de la carga de trabajo y, por lo tanto, se puede realizar antes de recibir la carga de trabajo. Ciertos pasos realizados durante la inicialización del TEE son idénticos para ciertas clases de cargas de trabajo. Por lo tanto, las partes comunes de la secuencia de inicialización del TEE se pueden realizar antes de que se solicite el TEE. Cuando se solicita un TEE para una carga de trabajo en la clase y se conocen las partes para especializar el TEE para su propósito particular, se realizan los pasos finales para inicializar el TEE. (Traducción automática con Google Translate, sin valor legal)