Secure deployment of an application across deployment locations

Methods and systems are provided for secure deployment of an application across deployment locations. Aspects include providing an application for analysis wherein the application is capable of being divided into processing nodes which can be deployed in different locations. The application processe...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: John Hosie, Martin Andrew Ross, Daniel James McGinnes, Craig Howard Stirling, Dominic John Storey
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator John Hosie
Martin Andrew Ross
Daniel James McGinnes
Craig Howard Stirling
Dominic John Storey
description Methods and systems are provided for secure deployment of an application across deployment locations. Aspects include providing an application for analysis wherein the application is capable of being divided into processing nodes which can be deployed in different locations. The application processes messages based on message models having annotations defining constraints on the deployment of data in given data aspects. The data aspects include the entire message or data fields, data elements or data structures of the message. Aspects also includes analyzing the application to identify processing nodes that reference the given data aspects having deployment constraints and determining a restriction for a processing node based on the deployment constraints of the referenced data aspects. Aspects further include deploying each processing node of the application according to the determined restriction.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_GB2561759A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>GB2561759A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_GB2561759A3</originalsourceid><addsrcrecordid>eNrjZLAPTk0uLUpVSEktyMmvzE3NK1HIT1NIzFNILCjIyUxOLMnMB7KTi_KLi5HV5ORDpIp5GFjTEnOKU3mhNDeDvJtriLOHbmpBfnxqcUFicmpeakm8u5ORqZmhuamlozFhFQANNTCw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Secure deployment of an application across deployment locations</title><source>esp@cenet</source><creator>John Hosie ; Martin Andrew Ross ; Daniel James McGinnes ; Craig Howard Stirling ; Dominic John Storey</creator><creatorcontrib>John Hosie ; Martin Andrew Ross ; Daniel James McGinnes ; Craig Howard Stirling ; Dominic John Storey</creatorcontrib><description>Methods and systems are provided for secure deployment of an application across deployment locations. Aspects include providing an application for analysis wherein the application is capable of being divided into processing nodes which can be deployed in different locations. The application processes messages based on message models having annotations defining constraints on the deployment of data in given data aspects. The data aspects include the entire message or data fields, data elements or data structures of the message. Aspects also includes analyzing the application to identify processing nodes that reference the given data aspects having deployment constraints and determining a restriction for a processing node based on the deployment constraints of the referenced data aspects. Aspects further include deploying each processing node of the application according to the determined restriction.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20181024&amp;DB=EPODOC&amp;CC=GB&amp;NR=2561759A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20181024&amp;DB=EPODOC&amp;CC=GB&amp;NR=2561759A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>John Hosie</creatorcontrib><creatorcontrib>Martin Andrew Ross</creatorcontrib><creatorcontrib>Daniel James McGinnes</creatorcontrib><creatorcontrib>Craig Howard Stirling</creatorcontrib><creatorcontrib>Dominic John Storey</creatorcontrib><title>Secure deployment of an application across deployment locations</title><description>Methods and systems are provided for secure deployment of an application across deployment locations. Aspects include providing an application for analysis wherein the application is capable of being divided into processing nodes which can be deployed in different locations. The application processes messages based on message models having annotations defining constraints on the deployment of data in given data aspects. The data aspects include the entire message or data fields, data elements or data structures of the message. Aspects also includes analyzing the application to identify processing nodes that reference the given data aspects having deployment constraints and determining a restriction for a processing node based on the deployment constraints of the referenced data aspects. Aspects further include deploying each processing node of the application according to the determined restriction.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLAPTk0uLUpVSEktyMmvzE3NK1HIT1NIzFNILCjIyUxOLMnMB7KTi_KLi5HV5ORDpIp5GFjTEnOKU3mhNDeDvJtriLOHbmpBfnxqcUFicmpeakm8u5ORqZmhuamlozFhFQANNTCw</recordid><startdate>20181024</startdate><enddate>20181024</enddate><creator>John Hosie</creator><creator>Martin Andrew Ross</creator><creator>Daniel James McGinnes</creator><creator>Craig Howard Stirling</creator><creator>Dominic John Storey</creator><scope>EVB</scope></search><sort><creationdate>20181024</creationdate><title>Secure deployment of an application across deployment locations</title><author>John Hosie ; Martin Andrew Ross ; Daniel James McGinnes ; Craig Howard Stirling ; Dominic John Storey</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_GB2561759A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>John Hosie</creatorcontrib><creatorcontrib>Martin Andrew Ross</creatorcontrib><creatorcontrib>Daniel James McGinnes</creatorcontrib><creatorcontrib>Craig Howard Stirling</creatorcontrib><creatorcontrib>Dominic John Storey</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>John Hosie</au><au>Martin Andrew Ross</au><au>Daniel James McGinnes</au><au>Craig Howard Stirling</au><au>Dominic John Storey</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Secure deployment of an application across deployment locations</title><date>2018-10-24</date><risdate>2018</risdate><abstract>Methods and systems are provided for secure deployment of an application across deployment locations. Aspects include providing an application for analysis wherein the application is capable of being divided into processing nodes which can be deployed in different locations. The application processes messages based on message models having annotations defining constraints on the deployment of data in given data aspects. The data aspects include the entire message or data fields, data elements or data structures of the message. Aspects also includes analyzing the application to identify processing nodes that reference the given data aspects having deployment constraints and determining a restriction for a processing node based on the deployment constraints of the referenced data aspects. Aspects further include deploying each processing node of the application according to the determined restriction.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_GB2561759A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Secure deployment of an application across deployment locations
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T10%3A55%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=John%20Hosie&rft.date=2018-10-24&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EGB2561759A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true