Method, system and program product for securing resources in a distributed system

Under the present invention, a mapping is provided that interrelates security permissions for an application-based resource with security permissions for a set of IT-based resources in the distributed system. When a desired security permission for the application-based resource is expressed, the map...

Full description

Saved in:
Bibliographic Details
Main Authors DINGER JOHN E, NASTACIO DENILSON, ARAUJO CARLOS CESAR F
Format Patent
LanguageEnglish
Published 16.02.2006
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Under the present invention, a mapping is provided that interrelates security permissions for an application-based resource with security permissions for a set of IT-based resources in the distributed system. When a desired security permission for the application-based resource is expressed, the mapping can be accessed to determine the corresponding security permissions for the IT-based resources. Once these security permissions are determined, resource plug-ins corresponding to the IT-based resources will effect their respective security permissions.
Bibliography:Application Number: US20040914689