Method, system and program product for securing resources in a distributed system
Under the present invention, a mapping is provided that interrelates security permissions for an application-based resource with security permissions for a set of IT-based resources in the distributed system. When a desired security permission for the application-based resource is expressed, the map...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
16.02.2006
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Under the present invention, a mapping is provided that interrelates security permissions for an application-based resource with security permissions for a set of IT-based resources in the distributed system. When a desired security permission for the application-based resource is expressed, the mapping can be accessed to determine the corresponding security permissions for the IT-based resources. Once these security permissions are determined, resource plug-ins corresponding to the IT-based resources will effect their respective security permissions. |
---|---|
Bibliography: | Application Number: US20040914689 |