发明名称 Method and apparatus for security-aware elasticity of application and services
摘要 In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
申请公布号 US8793766(B2) 申请公布日期 2014.07.29
申请号 US201213419037 申请日期 2012.03.13
申请人 International Business Machines Corporation 发明人 Kundu Ashish;Mohindra Ajay;Sahu Sambit
分类号 G06F21/00;H04L29/06;G06F9/50 主分类号 G06F21/00
代理机构 F. Chau & Associates, LLC 代理人 Percello, Esq. Louis J.;F. Chau & Associates, LLC
主权项 1. A method, comprising: determining, for each non-security component of an application, (a) types of interactions the non-security component has with security components of the application for a plurality of requests and a total number for each interaction type; determining, based on (a) and an expected number of incoming requests to the application: (b) types of requests to the security components from the non-security components and types of interactions with the security components involving the non-security components; and (c) for each type of request to the security components from the non-security components, a total number of requests to the security components involving the non-security components and a total number of interactions with the security components involving the non-security components; determining, for each security component, a capacity required to process each type of request involving the non-security components and a capacity required to perform each type of interaction involving the non-security components; and changing the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
地址 Armonk NY US