[go: up one dir, main page]

AU3268201A - Method for evaluating and selecting middleware - Google Patents

Method for evaluating and selecting middleware

Info

Publication number
AU3268201A
AU3268201A AU32682/01A AU3268201A AU3268201A AU 3268201 A AU3268201 A AU 3268201A AU 32682/01 A AU32682/01 A AU 32682/01A AU 3268201 A AU3268201 A AU 3268201A AU 3268201 A AU3268201 A AU 3268201A
Authority
AU
Australia
Prior art keywords
evaluating
middleware
selecting
selecting middleware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU32682/01A
Inventor
David L. Nichols
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Accenture LLP
Original Assignee
Andersen Consulting LLP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Andersen Consulting LLP filed Critical Andersen Consulting LLP
Publication of AU3268201A publication Critical patent/AU3268201A/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/465Distributed object oriented systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)
AU32682/01A 1999-11-03 2000-11-03 Method for evaluating and selecting middleware Abandoned AU3268201A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US16347799P 1999-11-03 1999-11-03
US60163477 1999-11-03
PCT/US2000/041894 WO2001033356A1 (en) 1999-11-03 2000-11-03 Method for evaluating and selecting middleware

Publications (1)

Publication Number Publication Date
AU3268201A true AU3268201A (en) 2001-05-14

Family

ID=22590178

Family Applications (3)

Application Number Title Priority Date Filing Date
AU32682/01A Abandoned AU3268201A (en) 1999-11-03 2000-11-03 Method for evaluating and selecting middleware
AU22489/01A Abandoned AU2248901A (en) 1999-11-03 2000-11-03 Netcentric computer security framework
AU25740/01A Abandoned AU2574001A (en) 1999-11-03 2000-11-03 Framework for integrating existing and new information technology applications and systems

Family Applications After (2)

Application Number Title Priority Date Filing Date
AU22489/01A Abandoned AU2248901A (en) 1999-11-03 2000-11-03 Netcentric computer security framework
AU25740/01A Abandoned AU2574001A (en) 1999-11-03 2000-11-03 Framework for integrating existing and new information technology applications and systems

Country Status (3)

Country Link
AU (3) AU3268201A (en)
CA (1) CA2389369C (en)
WO (3) WO2001033359A1 (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7565326B2 (en) 2000-05-25 2009-07-21 Randle William M Dialect independent multi-dimensional integrator using a normalized language platform and secure controlled access
US7418429B1 (en) * 2000-10-20 2008-08-26 Accenture Pte. Ltd. Method and system for facilitating a trusted on-line transaction between insurance businesses and networked consumers
EP1267545B1 (en) * 2001-06-14 2008-08-20 International Business Machines Corporation Intrusion detection in data processing system
US7590859B2 (en) 2001-08-24 2009-09-15 Secure Computing Corporation System and method for accomplishing two-factor user authentication using the internet
WO2003044701A1 (en) 2001-11-19 2003-05-30 Hewlett-Packard Company, A Delaware Corporation Methods, software modules and software application for logging transaction-tax-related transactions
TWI235580B (en) * 2002-05-03 2005-07-01 Ke-Cheng Fang Network security system and method for recording and resisting hacker
GB0513375D0 (en) 2005-06-30 2005-08-03 Retento Ltd Computer security
ATE399428T1 (en) * 2006-01-10 2008-07-15 Alcatel Lucent METHOD AND ACCESS SERVER FOR PROVIDING A CENTRAL LOGIN PROCEDURE TO A USER
US10210162B1 (en) 2010-03-29 2019-02-19 Carbonite, Inc. Log file management
US9715325B1 (en) 2012-06-21 2017-07-25 Open Text Corporation Activity stream based interaction
US9178770B2 (en) * 2013-12-23 2015-11-03 International Business Machines Corporation Auto incorporation of new components into a hierarchical network
WO2015152882A1 (en) * 2014-03-31 2015-10-08 Hewlett-Packard Development Company, L.P. Candidate services for an application
WO2015200211A1 (en) 2014-06-22 2015-12-30 Webroot Inc. Network threat prediction and blocking
US10395133B1 (en) 2015-05-08 2019-08-27 Open Text Corporation Image box filtering for optical character recognition
US10599844B2 (en) 2015-05-12 2020-03-24 Webroot, Inc. Automatic threat detection of executable files based on static data analysis
US10289686B1 (en) 2015-06-30 2019-05-14 Open Text Corporation Method and system for using dynamic content types
WO2018227136A1 (en) * 2017-06-09 2018-12-13 Equinix, Inc. Near real-time messaging service for data center infrastructure monitoring data
US10289525B2 (en) 2017-08-21 2019-05-14 Amadeus S.A.S. Multi-layer design response time calculator
FR3070213B1 (en) * 2017-08-21 2023-04-14 Amadeus Sas RESPONSE TIME MULTI-LAYER CONCEPT CALCULATOR
US10819556B1 (en) 2017-10-16 2020-10-27 Equinix, Inc. Data center agent for data center infrastructure monitoring data access and translation
CN108009258B (en) * 2017-12-10 2022-03-15 恒创数字科技(江苏)有限公司 Data acquisition and analysis platform capable of being configured online
US10728034B2 (en) 2018-02-23 2020-07-28 Webroot Inc. Security privilege escalation exploit detection and mitigation
US11314863B2 (en) 2019-03-27 2022-04-26 Webroot, Inc. Behavioral threat detection definition and compilation
US12206773B2 (en) * 2019-12-06 2025-01-21 Ismail Jibrin System, method, and device for vitality verification using a biometric one-time passcode
US11729187B2 (en) * 2020-02-24 2023-08-15 Microsoft Technology Licensing, Llc Encrypted overlay network for physical attack resiliency
US11695822B2 (en) 2021-07-16 2023-07-04 Adp, Inc. Unified integration pattern protocol for centralized handling of data feeds
CN116630034B (en) * 2023-07-21 2023-11-07 杭银消费金融股份有限公司 Wind control data processing system and method

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5560008A (en) * 1989-05-15 1996-09-24 International Business Machines Corporation Remote authentication and authorization in a distributed data processing system
US5333304A (en) * 1991-05-03 1994-07-26 International Business Machines Corporation Method and apparatus for software application evaluation utilizing compiler applications
JPH0644255A (en) * 1991-05-17 1994-02-18 Shimizu Corp Integrated production project information management system
US5321610A (en) * 1991-09-23 1994-06-14 The Cobre Group, Inc. Integrated product for implementing application software and process of developing integrated product for implementing application software
US5524047A (en) * 1993-09-15 1996-06-04 Cirrus Logic, Inc. Method and apparatus for emulating telephonic communications with a modem and headset
US5574828A (en) * 1994-04-28 1996-11-12 Tmrc Expert system for generating guideline-based information tools
US5745880A (en) * 1994-10-03 1998-04-28 The Sabre Group, Inc. System to predict optimum computer platform
US6006333A (en) * 1996-03-13 1999-12-21 Sun Microsystems, Inc. Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server
US5771385A (en) * 1996-03-29 1998-06-23 Sun Microsystems, Inc. Setting and getting system debug flags by name at runtime
US5748890A (en) * 1996-12-23 1998-05-05 U S West, Inc. Method and system for authenticating and auditing access by a user to non-natively secured applications
US5923756A (en) * 1997-02-12 1999-07-13 Gte Laboratories Incorporated Method for providing secure remote command execution over an insecure computer network
US6199193B1 (en) * 1997-03-18 2001-03-06 Fujitsu Limited Method and system for software development and software design evaluation server
US5991794A (en) * 1997-07-15 1999-11-23 Microsoft Corporation Component integration system for an application program
US5956513A (en) * 1997-08-07 1999-09-21 Mci Communications Corporation System and method for automated software build control
US6076168A (en) * 1997-10-03 2000-06-13 International Business Machines Corporation Simplified method of configuring internet protocol security tunnels
US6092196A (en) * 1997-11-25 2000-07-18 Nortel Networks Limited HTTP distributed remote user authentication system

Also Published As

Publication number Publication date
CA2389369C (en) 2012-06-05
WO2001033359A1 (en) 2001-05-10
AU2574001A (en) 2001-05-14
WO2001033356A1 (en) 2001-05-10
AU2248901A (en) 2001-05-14
WO2001033339A1 (en) 2001-05-10
CA2389369A1 (en) 2001-05-10

Similar Documents

Publication Publication Date Title
AU3268201A (en) Method for evaluating and selecting middleware
EP1271099A3 (en) Method and arrangement for determining movement
AU2001282786A1 (en) A sample preparing arrangement and a method
AU2001252973A1 (en) Biosensor and related method
AU7989400A (en) Compounds and methods
AU3215500A (en) Compounds and methods
AU1854901A (en) Novel method
AU2001282893A1 (en) Antenna structure and associated method
EP1469316A2 (en) Screening method
AU2001279850A1 (en) Method and arrangement for studsystem
AU7433900A (en) Screening methods
AU2308900A (en) Analysis method
AU2757600A (en) Yo-yo and method for manufacture
AU1553101A (en) Screening method
AU2001237530A1 (en) Method
AU6429000A (en) Screening method
AU2001241636A1 (en) Halotherapy method
AU2034501A (en) Capacity testing method and arrangement
EP1031954A3 (en) Measuring arrangement and method
AU3188900A (en) Colorimetric detection method
AU2872501A (en) Screening method
AU6041700A (en) Antenna arrangement and method
AU2310900A (en) Screening methods
AU4585100A (en) Method
AU5552200A (en) Method

Legal Events

Date Code Title Description
MK6 Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase