SYSTEM AND METHOD FOR SUPPORTING SECURE APPLICATION DEPLOYMENT IN A CLOUD
First Claim
1. A method of securely deploying a software application in the Internet cloud, comprising the steps of:
- identifying those aspects of a software application that use secure data, and those aspects of the application that use non-secure data;
deploying the secure data on one or more secure servers that are not publicly accessible over the Internet; and
deploying non-secure data on one or more cloud servers that are publicly available over the Internet,wherein communication between the secure servers and the cloud servers is managed using secure connections with access only to computation results.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of securely deploying a software application in the Internet cloud including identifying those aspects of a software application that use secure data, and those aspects of the application that use non-secure data, deploying the secure data on one or more secure servers that are not publicly accessible over the Internet, and deploying non-secure data on one or more cloud servers that are publicly available over the Internet, where communication between the secure servers and the cloud servers is managed using secure connections with access only to computation results.
42 Citations
10 Claims
-
1. A method of securely deploying a software application in the Internet cloud, comprising the steps of:
-
identifying those aspects of a software application that use secure data, and those aspects of the application that use non-secure data; deploying the secure data on one or more secure servers that are not publicly accessible over the Internet; and deploying non-secure data on one or more cloud servers that are publicly available over the Internet, wherein communication between the secure servers and the cloud servers is managed using secure connections with access only to computation results. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory program storage device readable by a computer, tangibly embodying a program of instructions executed by the computer to perform the method steps for securely deploying a software application in the Internet cloud, comprising the steps of:
-
identifying those aspects of a software application that use secure data, and those aspects of the application that use non-secure data; deploying the secure data on one or more secure servers that are not publicly accessible over the Internet; and deploying non-secure data on one or more cloud servers that are publicly available over the Internet, wherein communication between the secure servers and the cloud servers is managed using secure connections with access only to computation results. - View Dependent Claims (7, 8, 9, 10)
-
Specification