白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Method and arrangement for configuring a secure domain in a network functions virtualization infrastructure

專利號
US10897467B2
公開日期
2021-01-19
申請人
TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)(SE Stockholm)
發(fā)明人
Giuseppe Celozzi; Luca Baldini; Daniele Gaito; Gaetano Patria
IPC分類
H04L29/06; G06F9/455; H04L29/08; G06F21/53; H04L12/24; H04W12/02; G06F9/50; H04W12/00
技術(shù)領(lǐng)域
vnf,sd,nfvo,virtual,vim,location,ns,party,be,roles
地域: Stockholm

摘要

It is disclosed a method, an arrangement and a computer program for configuring a secure domain, SD, in a network functions virtualization infrastructure. The SD comprises virtual objects handling privileged information. NS instance information of a virtual object is obtained based on input from a party associated with the SD. The NS instance information is searched for a level of confidentiality and a geographic location information. When having identified the level of confidentiality and the geographic location information, the virtual object is allocated to the SD according to the geographic location information, based on the level of confidentiality and a specific role of the party. It is an advantage that access to a SD is allowed or granted based on the specific role of the party.

說明書

In fact, if role hierarchies are not separated or role privileges are inherited an administrator role could create parties that can be assigned SD administration roles or SD user roles which could bypass security constraints or in case roles inherit privileges, an administrator could act as a SD administrator or SD user and therefore act on classified objects.

As an alternative, a cloud administrator role and cloud SD administrator role may be assigned to one party having SOD applied already to this level. This implies that even a cloud administrator may not perform any action on sensitive objects, not even listing (READ only).

Here below is presented one example of a minimal role hierarchy. Additional roles may extend the hierarchy as long as security principles are complied with.

Example operations that may be considered are Create, Read, Update and Delete (CRUD) operated on objects. This comprises many variations, for instance cloning of data streams should be considered as a “create” type of operation and similarly for other specified operations.

The objects involved may be VL, VNF, VNFC, VNFCI, virtual machine image, VS, vTap, and/or vFEP, whenever they are used to implement a SD function.

A cloud administrator will have permission to create a tenant administrator.

A tenant administrator will have permission to create tenant users in standard data center domain.

A tenant user will have permission to create CRUD objects, except SD protected objects.

And especially, a cloud administrator SD, that is, an administrator in the secure domain of the cloud, will have permission to create a SD tenant administrator, that is, an administrator of a secure domain of a tenant.

權(quán)利要求

1
微信群二維碼
意見反饋