Optimizing interactions between co-located processes
First Claim
1. A method comprising:
- receiving, at a computer system, a request from a first composite application to invoke a web service operation of a second composite application,wherein the first composite application is associated with a reference policy, and the second composite application is associated with a service policy;
determining, by the computer system, based upon the service policy and the reference policy, whether a first mechanism that provides local invocation of the web service operation is secure, the first mechanism providing an optimized invocation of the web service compared to a second mechanism that provides invocation of the web service; and
invoking the web service operation using the first mechanism that provides local invocation rather than the second mechanism in response to determining that the first mechanism that provides local invocation is secure;
wherein determining whether the first mechanism that provides local invocation of the web service is secure comprises determining that an attribute associated with the reference policy and an attribute associated with the service policy indicate that the reference and service policies are applicable to local invocation determinations.
1 Assignment
0 Petitions
Accused Products
Abstract
In one set of embodiments, methods, systems, and apparatus are provided to enable secure local invocation of a web service in response to receiving a request from a first composite application to invoke a web service operation of a second composite application, where the first application is associated with a reference policy, and the second application is associated with a service policy, then determining, based upon the service policy and the reference policy, whether local invocation is secure, and invoking the operation using the local invocation in response to determining that the local invocation is secure. Attributes associated with the reference and service policies can indicate whether those policies can be used in a local invocation, or if user authentication is needed before performing the invocation with those policies. The local invocation may comprise a procedure call in an application server from the first application to the second application.
-
Citations
18 Claims
-
1. A method comprising:
-
receiving, at a computer system, a request from a first composite application to invoke a web service operation of a second composite application, wherein the first composite application is associated with a reference policy, and the second composite application is associated with a service policy; determining, by the computer system, based upon the service policy and the reference policy, whether a first mechanism that provides local invocation of the web service operation is secure, the first mechanism providing an optimized invocation of the web service compared to a second mechanism that provides invocation of the web service; and invoking the web service operation using the first mechanism that provides local invocation rather than the second mechanism in response to determining that the first mechanism that provides local invocation is secure; wherein determining whether the first mechanism that provides local invocation of the web service is secure comprises determining that an attribute associated with the reference policy and an attribute associated with the service policy indicate that the reference and service policies are applicable to local invocation determinations. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor; and a non-transitory memory configured to store a set of instructions which when executed by the processor configure the processor to; receive a request from a first composite application to invoke a web service operation of a second composite application, wherein the first composite application is associated with a reference policy, and the second composite application is associated with a service policy, determine, based upon the service policy and the reference policy, whether a first mechanism that provides local invocation of the web service operation is secure, the first mechanism providing an optimized invocation of the web service compared to a second mechanism that provides invocation of the web service, wherein to determine whether the first mechanism that provides local invocation of the web service is secure the processor is configured to determine that an attribute associated with the reference policy and an attribute associated with the service policy indicate that the reference and service policies are applicable to local invocation determinations; and invoke the web service operation using the first mechanism that provides local invocation rather than the second mechanism in response to determining that the first mechanism that provides local invocation is secure. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory machine-readable medium for a computer system, the non-transitory machine-readable medium having stored thereon a series of instructions executable by a processor, the series of instructions comprising:
-
instructions that cause the processor to receive a request from a first composite application to invoke a web service operation of a second composite application, wherein the first composite application is associated with a reference policy, and the second composite application is associated with a service policy; instructions that cause the processor to determine, based upon the service policy and the reference policy, whether a first mechanism that provides local invocation of the web service operation is secure, the first mechanism providing an optimized invocation of the web service compared to a second mechanism that provides invocation of the web service; and instructions that cause the processor to invoke the web service operation using the first mechanism that provides local invocation rather than the second mechanism in response to determining that the first mechanism that provides local invocation is secure wherein the instructions that cause the processor to determine whether the first mechanism that provides local invocation of the web service is secure comprise instructions that cause the processor to determine that an attribute associated with the reference policy and an attribute associated with the service policy indicate that the reference and service policies are applicable to local invocation determinations. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification