Application server object-level security for distributed computing domains
First Claim
1. A computer readable memory device encoded with software for use in a distributed computing domain, the software performing steps comprising:
- distributing administrative objects and user objects to one or more application servers;
allowing a user to declare in a list which objects residing on each application server are to be protected;
reading the list by an interceptor;
responsive to exportation of a Common Object Request Broker Architecture (“
CORBA”
) compliant Interoperable Object Reference (“
IOR”
) for a listed object, associating by the interceptor one or more application server security flags with interfaces to the listed objects by tagging components of the IOR with one or more security flags; and
performing one or more security operations by an application server according to the security flags tagged to the IOR when a client accesses an application server-stored object, the security operations including an operation besides establishing secure communications between the client process and the server-stored object.
0 Assignments
0 Petitions
Accused Products
Abstract
Objects on application servers are distributed to one or more application servers; a user is allowed to declare in a list which objects residing on each application server are to be protected; the list is read by an interceptor; responsive to exportation of a Common Object Request Broker Architecture (“CORBA”) compliant Interoperable Object Reference (“IOR”) for a listed object, the interceptor associates one or more application server security flags with interfaces to the listed objects by tagging components of the IOR with one or more security flags; and one or more security operations are performed by an application server according to the security flags tagged to the IOR when a client accesses an application server-stored object, the security operations including an operation besides establishing secure communications between the client process and the server-stored object.
25 Citations
18 Claims
-
1. A computer readable memory device encoded with software for use in a distributed computing domain, the software performing steps comprising:
-
distributing administrative objects and user objects to one or more application servers; allowing a user to declare in a list which objects residing on each application server are to be protected; reading the list by an interceptor; responsive to exportation of a Common Object Request Broker Architecture (“
CORBA”
) compliant Interoperable Object Reference (“
IOR”
) for a listed object, associating by the interceptor one or more application server security flags with interfaces to the listed objects by tagging components of the IOR with one or more security flags; andperforming one or more security operations by an application server according to the security flags tagged to the IOR when a client accesses an application server-stored object, the security operations including an operation besides establishing secure communications between the client process and the server-stored object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An object-level security system in a distributed computing domain comprising:
-
one or more administrative objects and one or more user objects distributed among one or more computer readable memory devices of one or more application server computers; a user-declared list of objects residing in computer readable memory devices of each of the application server computers which are to be protected; an interceptor portion of a computing platform configured to read the list, and to, responsive to exportation of a Common Object Request Broker Architecture (“
CORBA”
) compliant Interoperable Object Reference (“
IOR”
) for a list object, to associate one or more application server security flags associated with interfaces to the listed objects by tagging components of the IOR with one or more security flags; andone or more security operations performed by an application server computer in cooperation with a client process responsive to access by the client process of an object having a tagged IOR, said security operations including an operation besides establishing secure communications between the client process and the server-stored object. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification