OPTIMIZING INTERACTIONS BETWEEN CO-LOCATED PROCESSES
First Claim
1. A method comprising:
- receiving, at a computer system, a request from a first composite application to invoke a web service operation of a second composite application,wherein the first application is associated with a reference policy, and the second application is associated with a service policy;
determining, by the computer system, based upon the service policy and the reference policy, whether local invocation of the web service operation is secure; and
invoking the web service operation using the local invocation in response to determining that local invocation is secure.
1 Assignment
0 Petitions
Accused Products
Abstract
In one set of embodiments, methods, systems, and apparatus are provided to enable secure local invocation of a web service in response to receiving a request from a first composite application to invoke a web service operation of a second composite application, where the first application is associated with a reference policy, and the second application is associated with a service policy, then determining, based upon the service policy and the reference policy, whether local invocation is secure, and invoking the operation using the local invocation in response to determining that the local invocation is secure. Attributes associated with the reference and service policies can indicate whether those policies can be used in a local invocation, or if user authentication is needed before performing the invocation with those policies. The local invocation may comprise a procedure call in an application server from the first application to the second application.
20 Citations
21 Claims
-
1. A method comprising:
-
receiving, at a computer system, a request from a first composite application to invoke a web service operation of a second composite application, wherein the first application is associated with a reference policy, and the second application is associated with a service policy; determining, by the computer system, based upon the service policy and the reference policy, whether local invocation of the web service operation is secure; and invoking the web service operation using the local invocation in response to determining that local invocation is secure. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a processor configured to; receive a request from a first composite application to invoke a web service operation of a second composite application, wherein the first application is associated with a reference policy, and the second application is associated with a service policy; determine, based upon the service policy and the reference policy, whether local invocation of the web service operation is secure; and invoke the web service operation using the local invocation in response to determining that local invocation is secure. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium for a computer system, the non-transitory machine-readable medium having stored thereon a series of instructions executable by a processor, the series of instructions comprising:
-
instructions that cause the processor to receive a request from a first composite application to invoke a web service operation of a second composite application, wherein the first application is associated with a reference policy, and the second application is associated with a service policy; instructions that cause the processor to determine, based upon the service policy and the reference policy, whether local invocation of the web service operation is secure; and instructions that cause the processor to invoke the web service operation using the local invocation in response to determining that local invocation is secure. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification