Security-Aware Admission Control of Requests in a Distributed System
First Claim
1. A method comprising:
- identifying a request dropped by a first application component in a distributed system;
determining one or more actions to take with respect to the dropped request, said determining comprises;
identifying one or more policies of the first application component responsible for the dropped request; and
identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies; and
executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components;
wherein at least one of the steps is carried out by a computer device.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques, systems and articles of manufacture for security-aware admission control of requests in a distributed system. A method includes identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components.
10 Citations
16 Claims
-
1. A method comprising:
-
identifying a request dropped by a first application component in a distributed system; determining one or more actions to take with respect to the dropped request, said determining comprises; identifying one or more policies of the first application component responsible for the dropped request; and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies; and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components; wherein at least one of the steps is carried out by a computer device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16-25. -25. (canceled)
Specification