Access guards for multi-tenant logging

作者: Luke R. Meyer , Eric M. Wolinetz , Jeffrey Jon Cantrill

DOI:

关键词:

摘要: Implementations of the present disclosure provide access guards for multi-tenant logging. A method includes receiving, by a processing device system, an request to logging stack comprising application logs associated with execution application. Responsive receiving request, user identifier and authorization token related are identified. Generating modified adding request. The references role from control list. Thereupon, is applied stack. identifies that accessible in view role.

参考文章(20)
Thorsten von Eicken, Jose Maria Blanquer Gonzalez, Raphael George Jacques Simon, Systems and methods for establishing cloud-based instances with independent permissions ,(2014)
Margaret Bouse, Stephen Miu, System and method for identity management ,(2014)
James Iry, William Gallagher, Zuye Zheng, Fiaz Hossain, Nagraj Kulkarni, Software Performance Profiling in a Multi-Tenant Environment ,(2011)
Susan Shanabrook, Denise Glaser, Narayan Bharadwaj, Secure access to customer log data in a multi-tenant environment ,(2012)
Roxanne Camille Skelly, Aaron Benjamin Brethorst, Nicholas Luis Astete, Gopalakrishnan Janakiraman, Joseph Michael Goldberg, Nikolai Slioussar, Jonathan Weeks, Matthew Hanlon, Alexander Kotelnikov, David William Richardson, Anthony A. Hutchinson, Petr Novodvorskiy, Multitenant hosted virtual machine infrastructure ,(2009)
Preethi Ramarathinam, Alexander Tkatch, Manisha Powar, Amit Kumar, Andreas Hofmann, Integration of Third-Party Business Applications with Hosted Multi-Tenant Business Software System ,(2009)
Andrew Schulert, Steven Beckhardt, Gregory Paul Ramsperger, Cloud queue access control ,(2015)
Loren M. Kohnfelder, Yadhu Gopalan, Upender Sandadi, Sharath Viswanathan, Matthew Lyons, Andrew Rogers, Angelo Vals, Christopher Jordan, Neil Coles, Scott Shell, Zoheb Vacheri, Centralized enforcement of name-based computer system security rules ,(2008)
Bradley Jeffery Behm, Gregory B. Roth, Authorized delegation of permissions ,(2015)
Bruce Talley, Serhiy Mykolayovych Serdyuk, Oleksii Serhiovych Osypov, Veniamin Serhiovych Simonov, Nail Ahmad Amin Abdalla, Systems and methods for multi-tenant data protection application ,(2014)