Framework for restricting resources consumed by ghost agents
First Claim
Patent Images
1. A method for restricting resources consumed by a ghost agent comprising the steps of:
- registering a ghost agent within a domain, wherein said ghost agent is configured to move across domains of a grid environment responsive to movements of an associated host;
responsive to said registering, conveying a containment policy for said domain to said ghost agent;
configuring said ghost agent according to said received containment policy; and
utilizing said containment policy of said ghost agent to restrict resources available to said ghost agent.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for restricting resources consumed by a ghost agent can include the step of registering a ghost agent within a domain. The ghost agent can move across domains of a grid environment responsive to movements of an associated host. Once registered, a containment policy for the domain can be received by the ghost agent. The ghost agent can be configured according to the received containment policy. The containment policy can be utilized to restrict resources that are available to the ghost agent.
75 Citations
25 Claims
-
1. A method for restricting resources consumed by a ghost agent comprising the steps of:
-
registering a ghost agent within a domain, wherein said ghost agent is configured to move across domains of a grid environment responsive to movements of an associated host;
responsive to said registering, conveying a containment policy for said domain to said ghost agent;
configuring said ghost agent according to said received containment policy; and
utilizing said containment policy of said ghost agent to restrict resources available to said ghost agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A framework comprising:
-
a ghost registry disposed within a domain of a grid environment, wherein said ghost registry comprises a containment policy for said domain; and
at least one ghost agent configured to move from domain to domain within said grid environment, wherein said ghost agents adhere to said containment policy when disposed within said domain. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A ghost agent disposed within a grid environment, wherein said ghost agent is configured to move within said grid environment to follow movements of an associated host, said ghost agent comprising:
-
an interface for associating said ghost agent with a host;
a ghost log configured to record data relating to said host; and
a ghost controller configured to receive at least one containment policy for a domain in which the ghost agent is disposed, wherein said ghost controller is further configured to restrict computing resources consumed by said ghost agent based upon said received containment policy.
-
-
16. A machine-readable storage having stored thereon, a computer program having a plurality of code sections, said code sections executable by a machine for causing the machine to perform the steps of:
-
registering a ghost agent within a domain, wherein said ghost agent is configured to move across domains of a grid environment responsive to movements of an associated host;
responsive to said registering, conveying a containment policy for said domain to said ghost agent;
configuring said ghost agent according to said received containment policy; and
utilizing said containment policy of said ghost agent to restrict resources available to said ghost agent. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system for restricting resources consumed by a ghost agent comprising:
-
means for registering a ghost agent within a domain, wherein said ghost agent is configured to move across domains of a grid environment responsive to movements of an associated host;
means for conveying a containment policy for said domain to said ghost agent responsive to said registering step;
means for configuring said ghost agent according to said received containment policy; and
means for utilizing said containment policy of said ghost agent to restrict resources available to said ghost agent.
-
Specification