Abstract:
Un ecosistema independiente de plataforma y de aplicación para la creación, consumo e intercambio o comercio de contenido digital generado por usuario permite que cualquier aplicación que opera en cualquier plataforma participe en economía manejada por el mercado para objetos digitales generados por usuario (UGDOs). El sistema de comercio es independiente de todas las aplicaciones participantes. Un método de atribución de metadatos para UGDOs en combinación con soporte de aplicación heterogénea a través de interfases bien definidas facilita la participación no limitada. Los metadatos atribuidos pueden entenderse y consumirse a través de plataformas y aplicaciones. Las técnicas de imposición de derechos de UGDO flexibles en combinación con servicio de intercambio justo flexible para esos derechos soportan todas las formas de UGDOs y, por lo tanto, transacciones comerciales. Las aplicaciones participantes pueden proporcionar imposición de derechos en algunos casos. La naturaleza de la imposición puede yacer sobre la naturaleza de contenido de UGDO, derechos en UGDOs o preferencias de autor. El sistema de intercambio o comercio asegura que todas las transacciones en la economía de UGDO son seguras, tolerantes a fallas y atómicas, lo que proporciona integridad y confianza en la economía de UGDO.
Abstract:
A platform and application independent ecosystem for the creation, consumption and trade of user generated digital content permits any application operating on any platform to participate in market driven economy for user generated digital objects (UGDOs). The trading system is independent of all participating applications. A metadata attribution method for UGDOs in combination with heterogeneous application support through well-defined interfaces facilitates unlimited participation. Attributed metadata may be understood and consumed across platforms and applications. Flexible UGDO rights enforcement techniques in combination with flexible fair exchange service for those rights support all manner of UGDOs and commercial transactions therefore. Participating application may provide rights enforcement in some instances. The nature of enforcement may rest on the nature of UGDO content, rights in UGDOs or author preferences. The trading system assures that all transactions in the UGDO economy are secure, fault tolerant and atomic, providing integrity and confidence in UGDO economy.
Abstract:
A platform and application independent ecosystem for the creation, consumption and trade of user generated digital content permits any application operating on any platform to participate in market driven economy for user generated digital objects (UGDOs). The trading system is independent of all participating applications. A metadata attribution method for UGDOs in combination with heterogeneous application support through well-defined interfaces facilitates unlimited participation. Attributed metadata may be understood and consumed across platforms and applications. Flexible UGDO rights enforcement techniques in combination with flexible fair exchange service for those rights support all manner of UGDOs and commercial transactions therefore. Participating application may provide rights enforcement in some instances. The nature of enforcement may rest on the nature of UGDO content, rights in UGDOs or author preferences. The trading system assures that all transactions in the UGDO economy are secure, fault tolerant and atomic, providing integrity and confidence in UGDO economy.
Abstract:
A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.
Abstract:
A strategy is described for assessing and mitigating vulnerabilities with in a data processing environment. The strategy collects access data that ref lects actual log-in behavior exhibited by users in the environment. The stra tegy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rig hts data, the strategy identifies how a user or other entity that gains acce ss to one part of the environment can potentially compromise additional part s of the environment. The strategy can recommend and implement steps aimed a t reducing any identified vulnerabilities.
Abstract:
A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.
Abstract:
A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.
Abstract:
A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.