Patents by Inventor Isabelle Marie Rouvellou
Isabelle Marie Rouvellou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9317432Abstract: Techniques for maintaining consistent replicas of data are disclosed. By way of example, a method for managing copies of objects within caches, in a system including multiple caches, includes the following steps. Consistent copies of objects are maintained within the caches. A home cache for each object is maintained, wherein the home cache maintains information identifying other caches likely containing a copy of the object. In response to a request to update an object, the home cache for the object is contacted to identify other caches which might have copies of the object.Type: GrantFiled: January 9, 2008Date of Patent: April 19, 2016Assignee: International Business Machines CorporationInventors: Judah M. Diament, Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou
-
Patent number: 8977845Abstract: Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. At least one service of the plurality of services is invoked. State information is associated with the at least one service invoked. The state information is used to authenticate a client with at least one service. Further, a method for access control in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. A rule specification language is provided. At least one rule is specified using the rule specification language. A verification is performed to determine whether or not the client satisfies the at least one rule. The client is granted access to a service when the client satisfies the at least one rule.Type: GrantFiled: April 12, 2007Date of Patent: March 10, 2015Assignee: International Business Machines CorporationInventors: Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou, Mudhakar Srivalso, Jian Yin
-
Patent number: 8341212Abstract: Techniques are disclosed for generation and refinement of service descriptions based on records of invocations of the services, i.e., service description refinement based on actual service use. For example, a method for describing one or more services in a service-oriented environment comprised of one or more clients invoking the one or more services comprises the following steps. An initial description is established for at least one of the one or more services. Information is collected from one or more service invocations including at least one of a client identity, a value of at least one parameter, a return value, and an execution time. The information is analyzed to refine the description.Type: GrantFiled: October 30, 2008Date of Patent: December 25, 2012Assignee: International Business Machines CorporationInventors: Judah M. Diament, Arun Kwangil Iyengar, Thomas Arthur Mikalsen, Isabelle Marie Rouvellou, Ignacio Silva-Lepe, Revathi Subramanian
-
Patent number: 8108910Abstract: Techniques are disclosed for adaptively determining trust in client-server environments. By way of example, a method for assigning a trust level to a client in a client-server environment including at least one client communicating with a plurality of servers includes the following steps. Information associated with a server s1 and a server s2 different from s1 is obtained regarding a request r1 sent by a client and received by s1 and a request r2 sent by the client and received by s2. The obtained information is utilized to assign at least one trust level to the client.Type: GrantFiled: October 16, 2007Date of Patent: January 31, 2012Assignee: International Business Machines CorporationInventors: William G. Conner, II, Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou
-
Patent number: 8108855Abstract: Deploying a set of virtual software resource templates to a plurality of nodes is provided. The process identifies a set of virtual machine images and metadata to form a set of virtual software resource templates. The process creates a model that indicates a performance metric based on a number of nodes on which a number of virtual machine images is deployed. The process receives a quality of service requirement. The process determines, using the model, a sufficient number of virtual software resource templates in the set of virtual software resource templates and a sufficient number of nodes in the plurality of nodes to fulfill the quality of service requirement. The process deploys the sufficient number of virtual software resource templates on the sufficient number of nodes using the metadata.Type: GrantFiled: September 12, 2007Date of Patent: January 31, 2012Assignee: International Business Machines CorporationInventors: Daniel Manuel Dias, Arun Kwangil Iyengar, Isabelle Marie Rouvellou, Hidayatullah Habeebullah Shaikh, Jian Yin
-
Publication number: 20100114620Abstract: Techniques are disclosed for generation and refinement of service descriptions based on records of invocations of the services, i.e., service description refinement based on actual service use. For example, a method for describing one or more services in a service-oriented environment comprised of one or more clients invoking the one or more services comprises the following steps. An initial description is established for at least one of the one or more services. Information is collected from one or more service invocations including at least one of a client identity, a value of at least one parameter, a return value, and an execution time. The information is analyzed to refine the description.Type: ApplicationFiled: October 30, 2008Publication date: May 6, 2010Inventors: Judah M. Diament, Arun Kwangil Iyengar, Thomas Arthur Mikalsen, Isabelle Marie Rouvellou, Ignacio Silva-Lepe, Revathi Subramanian
-
Publication number: 20090177841Abstract: Techniques for maintaining consistent replicas of data are disclosed. By way of example, a method for managing copies of objects within caches, in a system including multiple caches, includes the following steps. Consistent copies of objects are maintained within the caches. A home cache for each object is maintained, wherein the home cache maintains information identifying other caches likely containing a copy of the object. In response to a request to update an object, the home cache for the object is contacted to identify other caches which might have copies of the object.Type: ApplicationFiled: January 9, 2008Publication date: July 9, 2009Inventors: Judah M. Diament, Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou
-
Publication number: 20090100504Abstract: Techniques are disclosed for adaptively determining trust in client-server environments. By way of example, a method for assigning a trust level to a client in a client-server environment including at least one client communicating with a plurality of servers includes the following steps. Information associated with a server s1 and a server s2 different from s1 is obtained regarding a request r1 sent by a client and received by s1 and a request r2 sent by the client and received by s2. The obtained information is utilized to assign at least one trust level to the client.Type: ApplicationFiled: October 16, 2007Publication date: April 16, 2009Inventors: William G. Conner, II, Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou
-
Publication number: 20080256357Abstract: Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. At least one service of the plurality of services is invoked. State information is associated with the at least one service invoked. The state information is used to authenticate a client with at least one service. Further, a method for access control in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. A rule specification language is provided. At least one rule is specified using the rule specification language. A verification is performed to determine whether or not the client satisfies the at least one rule. The client is granted access to a service when the client satisfies the at least one rule.Type: ApplicationFiled: April 12, 2007Publication date: October 16, 2008Inventors: Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou, Mudhakar Srivalso, Jian Yin
-
Publication number: 20080163194Abstract: The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer program product for deploying a set of virtual software resource templates to a plurality of nodes. The process identifies a set of virtual machine images and metadata to form a set of virtual software resource templates. The process creates a model that indicates a performance metric based on a number of nodes on which a number of virtual machine images is deployed. The process receives a quality of service requirement. The process determines, using the model, a sufficient number of virtual software resource templates in the set of virtual software resource templates and a sufficient number of nodes in the plurality of nodes to fulfill the quality of service requirement. The process deploys the sufficient number of virtual software resource templates on the sufficient number of nodes using the metadata.Type: ApplicationFiled: September 12, 2007Publication date: July 3, 2008Inventors: Daniel Manuel Dias, Arun Kwangil Iyengar, Isabelle Marie Rouvellou, Hidayatullah Habeebullah Shaikh, Jian Yin
-
Patent number: 6954924Abstract: There is provided a method for employing a trigger point in a logic flow. The trigger point has at least one function associated therewith. A default strategy set is associated with the at least one function of the trigger point. The default strategy set has a capability of being replaced, in whole or in part, by a non-default strategy set. The strategy sets are for implementing the at least one function of the trigger point. The trigger point is dynamically configured, including establishing at least one context for the trigger point that respectively specifies a location of the strategy sets. The trigger point is executed when encountered during an execution of the logic flow, including selectively executing at least a portion of at least one of the default strategy set and the non-default strategy set based upon a current context from among the at least one context.Type: GrantFiled: September 20, 2001Date of Patent: October 11, 2005Assignee: International Business Machines CorporationInventors: Louis R. Degenaro, Shawn William Lauzon, Jon Kendall Peterson, Dianne E. Richards, Isabelle Marie Rouvellou, Scott E. Waldner
-
Patent number: 6697826Abstract: An information-handling system operable within a distributed object computing environment (DOCE) is disclosed that includes an object-based program for controlling object searching in a constraint-based filtering mode over said DOCE. The object-based program for controlling object searching further comprises means for providing hierarchical storage of a name/binding value during a search. Additionally, the object-based program includes a means for providing the addition of properties as name/value pair sequence to each node within a tree search performed by the object-based program. Further, the search mechanism includes means for providing recursive searching of the group properties as well as means for providing meta-knowledge of the class within the DOCE for attribute search.Type: GrantFiled: March 20, 1996Date of Patent: February 24, 2004Assignee: International Business Machines CorporationInventors: Vinoj Narayan Kumar, Isabelle Marie Rouvellou, Donald Francis Ferguson
-
Publication number: 20030056201Abstract: There is provided a method for employing a trigger point in a logic flow. The trigger point has at least one function associated therewith. A default strategy set is associated with the at least one function of the trigger point. The default strategy set has a capability of being replaced, in whole or in part, by a non-default strategy set. The strategy sets are for implementing the at least one function of the trigger point. The trigger point is dynamically configured, including establishing at least one context for the trigger point that respectively specifies a location of the strategy sets. The trigger point is executed when encountered during an execution of the logic flow, including selectively executing at least a portion of at least one of the default strategy set and the non-default strategy set based upon a current context from among the at least one context.Type: ApplicationFiled: September 20, 2001Publication date: March 20, 2003Applicant: International Business Machines CorporationInventors: Louis R. Degenaro, Shawn William Lauzon, Jon Kendall Peterson, Dianne E. Richards, Isabelle Marie Rouvellou, Scott E. Waldner