Abstract:
PROBLEM TO BE SOLVED: To provide a method for providing a guaranteed distributed failure notification. SOLUTION: A failure notification (FN) function allows applications using the function to create an FN group to which the application associates an application state. The application registers a failure handler in the FN function on a node in the FN group and each failure handler is associated with a specific FN group. When the FN function learns of a failure in the FN group on a given node, this function executes an associated failure handler on the node. The system failure detected by the application is signaled to other FN group members using this function. This function detects a system failure that occurs in an overlay network on which this function is implemented, and signals the failure notification to the other FN group members. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
A strategy is described for assessing and mitigating vulnerabilities with in a data processing environment. The strategy collects access data that ref lects actual log-in behavior exhibited by users in the environment. The stra tegy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rig hts data, the strategy identifies how a user or other entity that gains acce ss to one part of the environment can potentially compromise additional part s of the environment. The strategy can recommend and implement steps aimed a t reducing any identified vulnerabilities.
Abstract:
A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.
Abstract:
A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.
Abstract:
A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.