发明名称 AUTHENTICATION AND AUTHORIZATION METHODS FOR CLOUD COMPUTING PLATFORM SECURITY
摘要 <p>An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.</p>
申请公布号 WO2013000080(A1) 申请公布日期 2013.01.03
申请号 WO2012CA50422 申请日期 2012.06.26
申请人 INTERNATIONAL BUSINESS MACHINES CORPORATION;IBM CANADA LIMITED-IBM CANADA LIMITEE;CHANG, DAVID YU;BENANTAR, MESSAOUD;CHANG, JOHN YOW-CHUN;VENKATARAMAPPA, VISHWANATH 发明人 CHANG, DAVID YU;BENANTAR, MESSAOUD;CHANG, JOHN YOW-CHUN;VENKATARAMAPPA, VISHWANATH
分类号 H04L9/32;H04L12/24 主分类号 H04L9/32
代理机构 代理人
主权项
地址