GB2568463B - Containerised Programming - Google Patents

Containerised Programming Download PDF

Info

Publication number
GB2568463B
GB2568463B GB1718557.0A GB201718557A GB2568463B GB 2568463 B GB2568463 B GB 2568463B GB 201718557 A GB201718557 A GB 201718557A GB 2568463 B GB2568463 B GB 2568463B
Authority
GB
United Kingdom
Prior art keywords
containerised
programming
containerised programming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1718557.0A
Other versions
GB201718557D0 (en
GB2568463A (en
Inventor
Cristina Claudia
Beddus Simon
El-Moussa Fadi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to GB1718557.0A priority Critical patent/GB2568463B/en
Publication of GB201718557D0 publication Critical patent/GB201718557D0/en
Publication of GB2568463A publication Critical patent/GB2568463A/en
Application granted granted Critical
Publication of GB2568463B publication Critical patent/GB2568463B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
GB1718557.0A 2017-11-09 2017-11-09 Containerised Programming Active GB2568463B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1718557.0A GB2568463B (en) 2017-11-09 2017-11-09 Containerised Programming

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1718557.0A GB2568463B (en) 2017-11-09 2017-11-09 Containerised Programming

Publications (3)

Publication Number Publication Date
GB201718557D0 GB201718557D0 (en) 2017-12-27
GB2568463A GB2568463A (en) 2019-05-22
GB2568463B true GB2568463B (en) 2020-07-22

Family

ID=60788242

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1718557.0A Active GB2568463B (en) 2017-11-09 2017-11-09 Containerised Programming

Country Status (1)

Country Link
GB (1) GB2568463B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100313196A1 (en) * 2009-06-03 2010-12-09 Apple Inc. Managing securely installed applications
EP2782038A1 (en) * 2013-03-19 2014-09-24 STMicroelectronics (Grenoble 2) SAS Resource management in a processor for trusted and untrusted applications
US20170300697A1 (en) * 2016-04-13 2017-10-19 International Business Machines Corporation Enforcing security policies for software containers

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100313196A1 (en) * 2009-06-03 2010-12-09 Apple Inc. Managing securely installed applications
EP2782038A1 (en) * 2013-03-19 2014-09-24 STMicroelectronics (Grenoble 2) SAS Resource management in a processor for trusted and untrusted applications
US20170300697A1 (en) * 2016-04-13 2017-10-19 International Business Machines Corporation Enforcing security policies for software containers

Also Published As

Publication number Publication date
GB201718557D0 (en) 2017-12-27
GB2568463A (en) 2019-05-22

Similar Documents

Publication Publication Date Title
ZAA201800631S (en) Containers
AP00986S1 (en) Containers
IL285185A (en) Single-layer container
ZAA201800721S (en) Containers
AP00971S1 (en) Container
SG11202001400YA (en) Closure
AU201714611S (en) Container
GB201709214D0 (en) Container
GB201709133D0 (en) Containerised programming
PL3565763T3 (en) Container
GB2560742B (en) Container
GB201712748D0 (en) Container
GB2568463B (en) Containerised Programming
GB201817800D0 (en) Container
GB2566016B (en) Container
GB2564382B (en) Container
GB201720474D0 (en) Container
AU201716600S (en) container
GB201715252D0 (en) Container
GB201714622D0 (en) Container
GB201713445D0 (en) Container
GB201708099D0 (en) Closure
AU201714613S (en) Container
AU201714614S (en) Container
AU201714612S (en) Container