×

Policy implementation in a networked computing environment

  • US 9,088,570 B2
  • Filed: 03/26/2012
  • Issued: 07/21/2015
  • Est. Priority Date: 03/26/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method for implementing policies in a networked cloud computing environment, comprising:

  • providing a set of layers of a cloud computing network stack in the networked computing environment, the set of cloud layers comprising;

    a business processes as a service cloud layer providing business application services and industry solutions,a platform as a service cloud layer comprising;

    an applications services sub-layer providing collaboration, analytics, and/or process management,an application lifecycle sub-layer providing developer and tester collaboration, development automation, and lifecycle traceability,an integration sub-layer providing process integration, application and data integration, identity integration, management integration, and/or spillover/failover services, anda workload services sub-layer providing elastic application runtimes, elastic application resources, workload and topology patterns, dynamic workload management, fine-grained service level agreement enforcement, application health management and self-healing, continuously available applications, multi-tenant applications, and workload and data mobility, and an infrastructure as a service cloud layer comprising;

    an operations support system sub-layer providing service quality management, image management, service asset management, service operations management, and service automation management,an optimization sub-layer providing heterogeneous platform management, workload acceleration, optimized workload placement, virtualized computation, network and storage, and power management, anda security sub-layer providing security management, tenant isolation, identity management, intrusion detection, and data protection;

    evaluating an applicability of a policy to the set of layers of the cloud computing network stack in the networked computing environment, the policy being drawn from a set of policies stored in at least one computer storage device;

    determining an effectiveness of the policy as applied to the set of cloud layers; and

    determining, based on a best-fit with regard to the effectiveness, a protocol for how and where to implement the policy for at least one cloud layer of the set of cloud layers.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×