Implementing information technology management policies

A method (200) of implementing a policy of an information technology (IT) system. A requestor group (110) comprising a plurality of requestors with equal privileges under the policy is formed (210). A resource group (116) comprising a plurality of resources to be accessed by the resource group subje...

Full description

Saved in:
Bibliographic Details
Main Author SUNDARESAN RAMAMOORTHY
Format Patent
LanguageEnglish
Published 03.11.2004
Edition7
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method (200) of implementing a policy of an information technology (IT) system. A requestor group (110) comprising a plurality of requestors with equal privileges under the policy is formed (210). A resource group (116) comprising a plurality of resources to be accessed by the resource group subject to the policy is formed (220). The policy is implemented as the requestor group acting upon the resource group (230). The requester group may comprise an internet protocol address or information identifying specific users. The resource group may comprise a communications protocol, an application software program, a firewall device, a network router, a data set stored on computer readable media or a server computer system. The implemented policy may comprise one or more natural language statements.
Bibliography:Application Number: GB20040007726