| EP0825506B1 (en) | 1996-08-20 | 2013-03-06 | Invensys Systems, Inc. | Methods and apparatus for remote process control |
| US6947580B1 (en)* | 1996-09-30 | 2005-09-20 | Dalton Patrick Enterprises, Inc. | Pointing device with biometric sensor |
| US7821926B2 (en) | 1997-03-10 | 2010-10-26 | Sonicwall, Inc. | Generalized policy server |
| US8914410B2 (en) | 1999-02-16 | 2014-12-16 | Sonicwall, Inc. | Query interface to policy server |
| US7912856B2 (en)* | 1998-06-29 | 2011-03-22 | Sonicwall, Inc. | Adaptive encryption |
| US6408336B1 (en) | 1997-03-10 | 2002-06-18 | David S. Schneider | Distributed administration of access to information |
| US6249868B1 (en)* | 1998-03-25 | 2001-06-19 | Softvault Systems, Inc. | Method and system for embedded, automated, component-level control of computer systems and other complex systems |
| US6339826B2 (en) | 1998-05-05 | 2002-01-15 | International Business Machines Corp. | Client-server system for maintaining a user desktop consistent with server application user access permissions |
| US7673323B1 (en) | 1998-10-28 | 2010-03-02 | Bea Systems, Inc. | System and method for maintaining security in a distributed computer network |
| US6158010A (en)* | 1998-10-28 | 2000-12-05 | Crosslogix, Inc. | System and method for maintaining security in a distributed computer network |
| US6460141B1 (en) | 1998-10-28 | 2002-10-01 | Rsa Security Inc. | Security and access management system for web-enabled and non-web-enabled applications and content on a computer network |
| US6321338B1 (en) | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
| US6510466B1 (en)* | 1998-12-14 | 2003-01-21 | International Business Machines Corporation | Methods, systems and computer program products for centralized management of application programs on a network |
| US6324578B1 (en) | 1998-12-14 | 2001-11-27 | International Business Machines Corporation | Methods, systems and computer program products for management of configurable application programs on a network |
| IL128720A (en) | 1999-02-25 | 2009-06-15 | Cidway Technologies Ltd | Method for certification of over the phone transactions |
| JP2000278290A (en)* | 1999-03-29 | 2000-10-06 | Matsushita Electric Ind Co Ltd | Network management system |
| US7370071B2 (en) | 2000-03-17 | 2008-05-06 | Microsoft Corporation | Method for serving third party software applications from servers to client computers |
| US6408326B1 (en)* | 1999-04-20 | 2002-06-18 | Microsoft Corporation | Method and system for applying a policy to binary data |
| US8099758B2 (en)* | 1999-05-12 | 2012-01-17 | Microsoft Corporation | Policy based composite file system and method |
| AU4979400A (en)* | 1999-05-14 | 2000-12-05 | Pivia, Inc. | Applications and services supported by a client-server independent intermediary mechanism |
| US7272815B1 (en)* | 1999-05-17 | 2007-09-18 | Invensys Systems, Inc. | Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects |
| AU5273100A (en)* | 1999-05-17 | 2000-12-05 | Foxboro Company, The | Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects |
| US7089530B1 (en) | 1999-05-17 | 2006-08-08 | Invensys Systems, Inc. | Process control configuration system with connection validation and configuration |
| CN100384191C (en)* | 1999-06-10 | 2008-04-23 | 阿尔卡塔尔互联网运行公司 | Policy-Based Network Architecture |
| US7032022B1 (en) | 1999-06-10 | 2006-04-18 | Alcatel | Statistics aggregation for policy-based network |
| US6788980B1 (en)* | 1999-06-11 | 2004-09-07 | Invensys Systems, Inc. | Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network |
| US6745332B1 (en)* | 1999-06-29 | 2004-06-01 | Oracle International Corporation | Method and apparatus for enabling database privileges |
| US6765864B1 (en) | 1999-06-29 | 2004-07-20 | Cisco Technology, Inc. | Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive data network |
| US6539379B1 (en)* | 1999-08-23 | 2003-03-25 | Oblix, Inc. | Method and apparatus for implementing a corporate directory and service center |
| US6587876B1 (en)* | 1999-08-24 | 2003-07-01 | Hewlett-Packard Development Company | Grouping targets of management policies |
| US20030115246A1 (en)* | 1999-08-24 | 2003-06-19 | Hewlett-Packard Company And Intel Corporation | Policy management for host name mapped to dynamically assigned network address |
| GB2355323A (en)* | 1999-10-05 | 2001-04-18 | Authoriszor Ltd | Information security profile and policy system |
| US6990591B1 (en)* | 1999-11-18 | 2006-01-24 | Secureworks, Inc. | Method and system for remotely configuring and monitoring a communication device |
| US6581110B1 (en)* | 1999-12-07 | 2003-06-17 | International Business Machines Corporation | Method and system for reading and propagating authenticated time throughout a worldwide enterprise system |
| US7209980B2 (en)* | 1999-12-17 | 2007-04-24 | Gateway Inc. | Method and system for interpreting device control commands |
| US6826695B1 (en)* | 2000-01-04 | 2004-11-30 | International Business Machines Corporation | Method and system for grouping of systems in heterogeneous computer network |
| US6779120B1 (en) | 2000-01-07 | 2004-08-17 | Securify, Inc. | Declarative language for specifying a security policy |
| US8074256B2 (en)* | 2000-01-07 | 2011-12-06 | Mcafee, Inc. | Pdstudio design system and method |
| US6684244B1 (en) | 2000-01-07 | 2004-01-27 | Hewlett-Packard Development Company, Lp. | Aggregated policy deployment and status propagation in network management systems |
| US20020162008A1 (en)* | 2000-01-28 | 2002-10-31 | Vincent Hill | Method and system for controlling access to a telecommunication or internet system |
| US7251666B2 (en)* | 2000-02-01 | 2007-07-31 | Internet Business Information Group | Signature loop authorizing method and apparatus |
| FR2805626B1 (en)* | 2000-02-29 | 2004-08-06 | Inovatel | METHOD AND SYSTEM FOR GRANTING PRIVILEGES BY AN ACCESS MANAGER WITHIN A COMMUNICATION NETWORK |
| EP1132797A3 (en)* | 2000-03-08 | 2005-11-23 | Aurora Wireless Technologies, Ltd. | Method for securing user identification in on-line transaction systems |
| US6880005B1 (en)* | 2000-03-31 | 2005-04-12 | Intel Corporation | Managing policy rules in a network |
| US6925443B1 (en) | 2000-04-26 | 2005-08-02 | Safeoperations, Inc. | Method, system and computer program product for assessing information security |
| US7574740B1 (en) | 2000-04-28 | 2009-08-11 | International Business Machines Corporation | Method and system for intrusion detection in a computer network |
| FI20001311A7 (en)* | 2000-05-31 | 2001-12-01 | Nokia Corp | Wireless local area network |
| US7024556B1 (en)* | 2000-06-02 | 2006-04-04 | 3Com Corporation | Distributed system authentication |
| US6854016B1 (en)* | 2000-06-19 | 2005-02-08 | International Business Machines Corporation | System and method for a web based trust model governing delivery of services and programs |
| US7219304B1 (en)* | 2000-06-19 | 2007-05-15 | International Business Machines Corporation | System and method for developing and administering web applications and services from a workflow, enterprise, and mail-enabled web application server and platform |
| US6874143B1 (en) | 2000-06-21 | 2005-03-29 | Microsoft Corporation | Architectures for and methods of providing network-based software extensions |
| US7624356B1 (en) | 2000-06-21 | 2009-11-24 | Microsoft Corporation | Task-sensitive methods and systems for displaying command sets |
| US7000230B1 (en)* | 2000-06-21 | 2006-02-14 | Microsoft Corporation | Network-based software extensions |
| US6883168B1 (en)* | 2000-06-21 | 2005-04-19 | Microsoft Corporation | Methods, systems, architectures and data structures for delivering software via a network |
| AU2001264895A1 (en)* | 2000-06-21 | 2002-01-02 | Microsoft Corporation | System and method for integrating spreadsheets and word processing tables |
| US7155667B1 (en)* | 2000-06-21 | 2006-12-26 | Microsoft Corporation | User interface for integrated spreadsheets and word processing tables |
| US6948135B1 (en)* | 2000-06-21 | 2005-09-20 | Microsoft Corporation | Method and systems of providing information to computer users |
| US7191394B1 (en)* | 2000-06-21 | 2007-03-13 | Microsoft Corporation | Authoring arbitrary XML documents using DHTML and XSLT |
| US7346848B1 (en)* | 2000-06-21 | 2008-03-18 | Microsoft Corporation | Single window navigation methods and systems |
| EP1168752A1 (en) | 2000-06-23 | 2002-01-02 | Matra Nortel Communications | Access control in client-sever systems |
| US7162649B1 (en) | 2000-06-30 | 2007-01-09 | Internet Security Systems, Inc. | Method and apparatus for network assessment and authentication |
| US8380630B2 (en)* | 2000-07-06 | 2013-02-19 | David Paul Felsher | Information record infrastructure, system and method |
| AU7182701A (en) | 2000-07-06 | 2002-01-21 | David Paul Felsher | Information record infrastructure, system and method |
| US7080077B2 (en)* | 2000-07-10 | 2006-07-18 | Oracle International Corporation | Localized access |
| US7464162B2 (en)* | 2000-07-10 | 2008-12-09 | Oracle International Corporation | Systems and methods for testing whether access to a resource is authorized based on access information |
| US8661539B2 (en)* | 2000-07-10 | 2014-02-25 | Oracle International Corporation | Intrusion threat detection |
| US7194764B2 (en)* | 2000-07-10 | 2007-03-20 | Oracle International Corporation | User authentication |
| US8204999B2 (en)* | 2000-07-10 | 2012-06-19 | Oracle International Corporation | Query string processing |
| US9038170B2 (en)* | 2000-07-10 | 2015-05-19 | Oracle International Corporation | Logging access system events |
| US7249369B2 (en) | 2000-07-10 | 2007-07-24 | Oracle International Corporation | Post data processing |
| US7134137B2 (en)* | 2000-07-10 | 2006-11-07 | Oracle International Corporation | Providing data to applications from an access system |
| US7124203B2 (en) | 2000-07-10 | 2006-10-17 | Oracle International Corporation | Selective cache flushing in identity and access management systems |
| US7801905B1 (en)* | 2003-11-25 | 2010-09-21 | Prabhdeep Singh | Knowledge archival and recollection systems and methods |
| AU2001295016A1 (en) | 2000-09-01 | 2002-03-13 | Sri International, Inc. | Probabilistic alert correlation |
| US6823462B1 (en)* | 2000-09-07 | 2004-11-23 | International Business Machines Corporation | Virtual private network with multiple tunnels associated with one group name |
| GB2366948B (en)* | 2000-09-15 | 2004-01-21 | Roke Manor Research | LAN user protocol |
| US6910132B1 (en)* | 2000-09-15 | 2005-06-21 | Matsushita Electric Industrial Co., Ltd. | Secure system and method for accessing files in computers using fingerprints |
| US7178166B1 (en) | 2000-09-19 | 2007-02-13 | Internet Security Systems, Inc. | Vulnerability assessment and authentication of a computer by a local scanner |
| US9027121B2 (en) | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
| US7146305B2 (en) | 2000-10-24 | 2006-12-05 | Vcis, Inc. | Analytical virtual machine |
| US7660902B2 (en)* | 2000-11-20 | 2010-02-09 | Rsa Security, Inc. | Dynamic file access control and management |
| US8255791B2 (en) | 2000-11-29 | 2012-08-28 | Dov Koren | Collaborative, flexible, interactive real-time displays |
| US7130466B2 (en) | 2000-12-21 | 2006-10-31 | Cobion Ag | System and method for compiling images from a database and comparing the compiled images with known images |
| US7415607B2 (en) | 2000-12-22 | 2008-08-19 | Oracle International Corporation | Obtaining and maintaining real time certificate status |
| US7475151B2 (en) | 2000-12-22 | 2009-01-06 | Oracle International Corporation | Policies for modifying group membership |
| US7349912B2 (en)* | 2000-12-22 | 2008-03-25 | Oracle International Corporation | Runtime modification of entries in an identity system |
| US7363339B2 (en) | 2000-12-22 | 2008-04-22 | Oracle International Corporation | Determining group membership |
| US7380008B2 (en)* | 2000-12-22 | 2008-05-27 | Oracle International Corporation | Proxy system |
| US6816871B2 (en)* | 2000-12-22 | 2004-11-09 | Oblix, Inc. | Delivering output XML with dynamically selectable processing |
| US7711818B2 (en) | 2000-12-22 | 2010-05-04 | Oracle International Corporation | Support for multiple data stores |
| US6782379B2 (en)* | 2000-12-22 | 2004-08-24 | Oblix, Inc. | Preparing output XML based on selected programs and XML templates |
| US7213249B2 (en) | 2000-12-22 | 2007-05-01 | Oracle International Corporation | Blocking cache flush requests until completing current pending requests in a local server and remote server |
| US7937655B2 (en) | 2000-12-22 | 2011-05-03 | Oracle International Corporation | Workflows with associated processes |
| US7802174B2 (en)* | 2000-12-22 | 2010-09-21 | Oracle International Corporation | Domain based workflows |
| US7085834B2 (en)* | 2000-12-22 | 2006-08-01 | Oracle International Corporation | Determining a user's groups |
| US7765580B2 (en)* | 2000-12-22 | 2010-07-27 | Entrust, Inc. | Method and apparatus for providing user authentication using a back channel |
| US7581011B2 (en) | 2000-12-22 | 2009-08-25 | Oracle International Corporation | Template based workflow definition |
| US8015600B2 (en) | 2000-12-22 | 2011-09-06 | Oracle International Corporation | Employing electronic certificate workflows |
| US7181618B2 (en)* | 2001-01-12 | 2007-02-20 | Hewlett-Packard Development Company, L.P. | System and method for recovering a security profile of a computer system |
| US7065644B2 (en)* | 2001-01-12 | 2006-06-20 | Hewlett-Packard Development Company, L.P. | System and method for protecting a security profile of a computer system |
| US7062649B2 (en)* | 2001-01-12 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | System and method for categorizing security profile rules within a computer system |
| US7206765B2 (en) | 2001-01-17 | 2007-04-17 | Contentguard Holdings, Inc. | System and method for supplying and managing usage rights based on rules |
| US8069116B2 (en) | 2001-01-17 | 2011-11-29 | Contentguard Holdings, Inc. | System and method for supplying and managing usage rights associated with an item repository |
| US6754642B2 (en) | 2001-05-31 | 2004-06-22 | Contentguard Holdings, Inc. | Method and apparatus for dynamically assigning usage rights to digital works |
| US7131000B2 (en)* | 2001-01-18 | 2006-10-31 | Bradee Robert L | Computer security system |
| WO2002061544A2 (en) | 2001-01-31 | 2002-08-08 | Internet Security Systems, Inc. | Method and system for configuring and scheduling security audits of a computer network |
| FI20010256A0 (en)* | 2001-02-12 | 2001-02-12 | Stonesoft Oy | Handling of packet data contact information in a security gateway element |
| US7213146B2 (en)* | 2001-02-20 | 2007-05-01 | Hewlett-Packard Development Company, L.P. | System and method for establishing security profiles of computers |
| US7290256B2 (en)* | 2001-02-26 | 2007-10-30 | International Business Machines Corporation | Separations-of-duties analysis tool for object-oriented integrated enterprise wide computing applications |
| US7185364B2 (en) | 2001-03-21 | 2007-02-27 | Oracle International Corporation | Access system interface |
| US7440962B1 (en) | 2001-02-28 | 2008-10-21 | Oracle International Corporation | Method and system for management of access information |
| US7062563B1 (en) | 2001-02-28 | 2006-06-13 | Oracle International Corporation | Method and system for implementing current user links |
| US7171411B1 (en) | 2001-02-28 | 2007-01-30 | Oracle International Corporation | Method and system for implementing shared schemas for users in a distributed computing system |
| US7350229B1 (en) | 2001-03-07 | 2008-03-25 | Netegrity, Inc. | Authentication and authorization mapping for a computer network |
| FR2822256B1 (en)* | 2001-03-13 | 2003-05-30 | Gemplus Card Int | VERIFICATION OF CONFORMITY OF ACCESS TO OBJECTS IN A DATA PROCESSING SYSTEM WITH A SECURITY POLICY |
| US7882555B2 (en)* | 2001-03-16 | 2011-02-01 | Kavado, Inc. | Application layer security method and system |
| US6920558B2 (en)* | 2001-03-20 | 2005-07-19 | Networks Associates Technology, Inc. | Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system |
| US20050177640A1 (en)* | 2001-03-20 | 2005-08-11 | Alan Rubinstein | Method for selectively providing access to voice and data networks by use of intelligent hardware |
| US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
| WO2003038695A1 (en)* | 2001-03-28 | 2003-05-08 | Vidius Inc. | Method and system for creation, management and analysis of distribution syndicates |
| US20030217333A1 (en)* | 2001-04-16 | 2003-11-20 | Greg Smith | System and method for rules-based web scenarios and campaigns |
| US7499948B2 (en) | 2001-04-16 | 2009-03-03 | Bea Systems, Inc. | System and method for web-based personalization and ecommerce management |
| US6914517B2 (en)* | 2001-04-17 | 2005-07-05 | Dalton Patrick Enterprises, Inc. | Fingerprint sensor with feature authentication |
| US20030236977A1 (en)* | 2001-04-25 | 2003-12-25 | Levas Robert George | Method and system for providing secure access to applications |
| US7003578B2 (en)* | 2001-04-26 | 2006-02-21 | Hewlett-Packard Development Company, L.P. | Method and system for controlling a policy-based network |
| US7036148B2 (en) | 2001-05-08 | 2006-04-25 | International Business Machines Corporation | Method of operating an intrusion detection system according to a set of business rules |
| US8141144B2 (en)* | 2001-05-10 | 2012-03-20 | Hewlett-Packard Development Company, L.P. | Security policy management for network devices |
| US7099663B2 (en) | 2001-05-31 | 2006-08-29 | Qualcomm Inc. | Safe application distribution and execution in a wireless environment |
| US7145900B2 (en)* | 2001-05-31 | 2006-12-05 | Go2Call.Com, Inc. | Packet-switched telephony call server |
| US7237264B1 (en) | 2001-06-04 | 2007-06-26 | Internet Security Systems, Inc. | System and method for preventing network misuse |
| US20020188572A1 (en)* | 2001-06-08 | 2002-12-12 | International Business Machines Corporation | Interface for creating privacy policies for the P3P specification |
| US7392546B2 (en) | 2001-06-11 | 2008-06-24 | Bea Systems, Inc. | System and method for server security and entitlement processing |
| US7231661B1 (en) | 2001-06-21 | 2007-06-12 | Oracle International Corporation | Authorization services with external authentication |
| WO2003001339A2 (en) | 2001-06-22 | 2003-01-03 | Wonderware Corporation | A security architecture for a process control platform executing applications |
| US7197764B2 (en)* | 2001-06-29 | 2007-03-27 | Bea Systems Inc. | System for and methods of administration of access control to numerous resources and objects |
| US6851113B2 (en)* | 2001-06-29 | 2005-02-01 | International Business Machines Corporation | Secure shell protocol access control |
| US7191337B2 (en)* | 2001-06-30 | 2007-03-13 | International Business Machines Corporation | Apparatus for wildcarded security policy and method therefor |
| US7546629B2 (en)* | 2002-03-06 | 2009-06-09 | Check Point Software Technologies, Inc. | System and methodology for security policy arbitration |
| US20040107360A1 (en)* | 2002-12-02 | 2004-06-03 | Zone Labs, Inc. | System and Methodology for Policy Enforcement |
| GB2377287B (en)* | 2001-07-06 | 2005-07-13 | Livedevices Ltd | Improvements relating to internet-connected devices |
| US7590684B2 (en)* | 2001-07-06 | 2009-09-15 | Check Point Software Technologies, Inc. | System providing methodology for access control with cooperative enforcement |
| US7904454B2 (en)* | 2001-07-16 | 2011-03-08 | International Business Machines Corporation | Database access security |
| US7243369B2 (en)* | 2001-08-06 | 2007-07-10 | Sun Microsystems, Inc. | Uniform resource locator access management and control system and method |
| WO2003021467A1 (en)* | 2001-08-13 | 2003-03-13 | Qualcomm, Incorporated | Using permissions to allocate device resources to an application |
| CN1975751B (en)* | 2001-08-15 | 2010-05-19 | 高通股份有限公司 | Test enabled application execution |
| JP4205323B2 (en)* | 2001-08-16 | 2009-01-07 | 日本電気株式会社 | Distribution system, distribution server and distribution method, distribution program |
| US20030046583A1 (en)* | 2001-08-30 | 2003-03-06 | Honeywell International Inc. | Automated configuration of security software suites |
| US7331061B1 (en) | 2001-09-07 | 2008-02-12 | Secureworks, Inc. | Integrated computer security management system and method |
| DE10146361B4 (en)* | 2001-09-20 | 2007-02-01 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Distributed system |
| ATE368900T1 (en)* | 2001-09-21 | 2007-08-15 | Koninkl Kpn Nv | COMPUTER SYSTEM, DATA TRANSMISSION NETWORK, COMPUTER PROGRAM AND DATA CARRIER, ALL FOR FILTERING MESSAGES INCLUDING CONTENT ACCORDING TO A MARKING LANGUAGE |
| US8776230B1 (en)* | 2001-10-02 | 2014-07-08 | Mcafee, Inc. | Master security policy server |
| US7194553B2 (en) | 2001-10-16 | 2007-03-20 | Microsoft Corporation | Resolving virtual network names |
| US8015204B2 (en) | 2001-10-16 | 2011-09-06 | Microsoft Corporation | Scoped access control metadata element |
| US7536712B2 (en) | 2001-10-16 | 2009-05-19 | Microsoft Corporation | Flexible electronic message security mechanism |
| EP1303097A3 (en) | 2001-10-16 | 2005-11-30 | Microsoft Corporation | Virtual distributed security system |
| US7676540B2 (en) | 2001-10-16 | 2010-03-09 | Microsoft Corporation | Scoped referral statements |
| US20030074568A1 (en)* | 2001-10-17 | 2003-04-17 | Kinsella David J. | Methods and apparatuses for performing secure transactions without transmitting biometric information |
| US7472342B2 (en)* | 2001-10-24 | 2008-12-30 | Bea Systems, Inc. | System and method for portal page layout |
| JP2003140890A (en) | 2001-10-31 | 2003-05-16 | Asgent Inc | Electronic device setting information creating method and device, security policy creating method and related device |
| US7412720B1 (en)* | 2001-11-02 | 2008-08-12 | Bea Systems, Inc. | Delegated authentication using a generic application-layer network protocol |
| US8041820B2 (en)* | 2001-11-16 | 2011-10-18 | Verizon Business Global Llc | Dial-up access manager |
| US7899047B2 (en) | 2001-11-27 | 2011-03-01 | Microsoft Corporation | Virtual network with adaptive dispatcher |
| US7225256B2 (en) | 2001-11-30 | 2007-05-29 | Oracle International Corporation | Impersonation in an access system |
| US20030126464A1 (en)* | 2001-12-04 | 2003-07-03 | Mcdaniel Patrick D. | Method and system for determining and enforcing security policy in a communication session |
| US7631184B2 (en) | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
| US7562232B2 (en) | 2001-12-12 | 2009-07-14 | Patrick Zuili | System and method for providing manageability to security information for secured items |
| US7478418B2 (en) | 2001-12-12 | 2009-01-13 | Guardian Data Storage, Llc | Guaranteed delivery of changes to security policies in a distributed system |
| US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
| US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
| US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
| US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
| US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
| US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
| US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
| US7783765B2 (en) | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
| US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
| US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
| US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
| US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
| US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
| US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
| USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
| US7350226B2 (en) | 2001-12-13 | 2008-03-25 | Bea Systems, Inc. | System and method for analyzing security policies in a distributed computer network |
| US7051341B2 (en) | 2001-12-14 | 2006-05-23 | International Business Machines Corporation | Method, system, and program for implementing a remote method call |
| ATE273591T1 (en)* | 2001-12-18 | 2004-08-15 | Stonesoft Corp | CHECKING THE CONFIGURATION OF A FIREWALL |
| US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
| WO2003060671A2 (en)* | 2002-01-04 | 2003-07-24 | Lab 7 Networks, Inc. | Communication security system |
| WO2003058451A1 (en) | 2002-01-04 | 2003-07-17 | Internet Security Systems, Inc. | System and method for the managed security control of processes on a computer system |
| US7088823B2 (en)* | 2002-01-09 | 2006-08-08 | International Business Machines Corporation | System and method for secure distribution and evaluation of compressed digital information |
| US7287053B2 (en)* | 2002-01-15 | 2007-10-23 | International Business Machines Corporation | Ad hoc data sharing in virtual team rooms |
| US7246230B2 (en)* | 2002-01-29 | 2007-07-17 | Bea Systems, Inc. | Single sign-on over the internet using public-key cryptography |
| US7855972B2 (en)* | 2002-02-08 | 2010-12-21 | Enterasys Networks, Inc. | Creating, modifying and storing service abstractions and role abstractions representing one or more packet rules |
| US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
| US6807636B2 (en) | 2002-02-13 | 2004-10-19 | Hitachi Computer Products (America), Inc. | Methods and apparatus for facilitating security in a network |
| GB2386710A (en)* | 2002-03-18 | 2003-09-24 | Hewlett Packard Co | Controlling access to data or documents |
| US20030182559A1 (en)* | 2002-03-22 | 2003-09-25 | Ian Curry | Secure communication apparatus and method for facilitating recipient and sender activity delegation |
| GB2386713B (en)* | 2002-03-22 | 2005-08-31 | Hewlett Packard Co | Apparatus for distributed access control |
| US7603452B1 (en) | 2002-03-26 | 2009-10-13 | Symantec Corporation | Networked computer environment assurance system and method |
| EP1349316A1 (en)* | 2002-03-27 | 2003-10-01 | BRITISH TELECOMMUNICATIONS public limited company | Policy based system management |
| CA2479651A1 (en)* | 2002-03-27 | 2003-10-09 | British Telecommunications Public Limited Company | Policy based system management |
| GB0208408D0 (en)* | 2002-04-12 | 2002-05-22 | Inte Vexis Ltd | Application engine |
| US6975914B2 (en) | 2002-04-15 | 2005-12-13 | Invensys Systems, Inc. | Methods and apparatus for process, factory-floor, environmental, computer aided manufacturing-based or other control system with unified messaging interface |
| US8613102B2 (en) | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
| WO2003093964A1 (en)* | 2002-05-01 | 2003-11-13 | Bea Systems, Inc. | Enterprise application platform |
| US7725560B2 (en) | 2002-05-01 | 2010-05-25 | Bea Systems Inc. | Web service-enabled portlet wizard |
| IL149583A0 (en)* | 2002-05-09 | 2003-07-06 | Kavado Israel Ltd | Method for automatic setting and updating of a security policy |
| US7370360B2 (en) | 2002-05-13 | 2008-05-06 | International Business Machines Corporation | Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine |
| US7216163B2 (en)* | 2002-05-15 | 2007-05-08 | Oracle International Corporation | Method and apparatus for provisioning tasks using a provisioning bridge server |
| US7840658B2 (en)* | 2002-05-15 | 2010-11-23 | Oracle International Corporation | Employing job code attributes in provisioning |
| US20030217032A1 (en)* | 2002-05-16 | 2003-11-20 | Dick Fritzler | System and method for providing business strategy and compliance information |
| US7058796B2 (en) | 2002-05-20 | 2006-06-06 | Airdefense, Inc. | Method and system for actively defending a wireless LAN against attacks |
| US7383577B2 (en)* | 2002-05-20 | 2008-06-03 | Airdefense, Inc. | Method and system for encrypted network management and intrusion detection |
| US20040203764A1 (en)* | 2002-06-03 | 2004-10-14 | Scott Hrastar | Methods and systems for identifying nodes and mapping their locations |
| US7042852B2 (en)* | 2002-05-20 | 2006-05-09 | Airdefense, Inc. | System and method for wireless LAN dynamic channel change with honeypot trap |
| US7277404B2 (en)* | 2002-05-20 | 2007-10-02 | Airdefense, Inc. | System and method for sensing wireless LAN activity |
| US7532895B2 (en) | 2002-05-20 | 2009-05-12 | Air Defense, Inc. | Systems and methods for adaptive location tracking |
| US7086089B2 (en)* | 2002-05-20 | 2006-08-01 | Airdefense, Inc. | Systems and methods for network security |
| JP4018450B2 (en)* | 2002-05-27 | 2007-12-05 | キヤノン株式会社 | Document management system, document management apparatus, authentication method, computer readable program, and storage medium |
| US7322044B2 (en) | 2002-06-03 | 2008-01-22 | Airdefense, Inc. | Systems and methods for automated network policy exception detection and correction |
| US20030229501A1 (en)* | 2002-06-03 | 2003-12-11 | Copeland Bruce Wayne | Systems and methods for efficient policy distribution |
| US7367044B2 (en)* | 2002-06-14 | 2008-04-29 | Clink Systems, Ltd. | System and method for network operation |
| CA2488901A1 (en)* | 2002-06-18 | 2003-12-24 | Computer Associates Think, Inc. | Methods and systems for managing enterprise assets |
| US7441264B2 (en)* | 2002-06-24 | 2008-10-21 | International Business Machines Corporation | Security objects controlling access to resources |
| US7356836B2 (en)* | 2002-06-28 | 2008-04-08 | Microsoft Corporation | User controls for a computer |
| US7428523B2 (en)* | 2002-07-11 | 2008-09-23 | Oracle International Corporation | Portal bridge |
| US7512585B2 (en)* | 2002-07-11 | 2009-03-31 | Oracle International Corporation | Support for multiple mechanisms for accessing data stores |
| US7206851B2 (en) | 2002-07-11 | 2007-04-17 | Oracle International Corporation | Identifying dynamic groups |
| US7428592B2 (en)* | 2002-07-11 | 2008-09-23 | Oracle International Corporation | Securely persisting network resource identifiers |
| US8375113B2 (en) | 2002-07-11 | 2013-02-12 | Oracle International Corporation | Employing wrapper profiles |
| US7447701B2 (en)* | 2002-07-11 | 2008-11-04 | Oracle International Corporation | Automatic configuration of attribute sets |
| US7467142B2 (en)* | 2002-07-11 | 2008-12-16 | Oracle International Corporation | Rule based data management |
| US7114037B2 (en)* | 2002-07-11 | 2006-09-26 | Oracle International Corporation | Employing local data stores to maintain data during workflows |
| US7478407B2 (en) | 2002-07-11 | 2009-01-13 | Oracle International Corporation | Supporting multiple application program interfaces |
| US6678828B1 (en)* | 2002-07-22 | 2004-01-13 | Vormetric, Inc. | Secure network file access control system |
| US7228407B2 (en)* | 2002-08-13 | 2007-06-05 | International Business Machines Corporation | Adaptive management method and system with automatic dependency resolution |
| US7340513B2 (en)* | 2002-08-13 | 2008-03-04 | International Business Machines Corporation | Resource management method and system with rule based consistency check |
| EP1540446A2 (en) | 2002-08-27 | 2005-06-15 | TD Security, Inc., dba Trust Digital, LLC | Enterprise-wide security system for computer devices |
| US20040111461A1 (en)* | 2002-08-28 | 2004-06-10 | Claudatos Christopher H. | Managing and controlling user applications with network switches |
| US7512810B1 (en) | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
| TW583559B (en)* | 2002-09-11 | 2004-04-11 | Hon Hai Prec Ind Co Ltd | Authorization and security management system and method |
| US20040064724A1 (en)* | 2002-09-12 | 2004-04-01 | International Business Machines Corporation | Knowledge-based control of security objects |
| US20040054791A1 (en)* | 2002-09-17 | 2004-03-18 | Krishnendu Chakraborty | System and method for enforcing user policies on a web server |
| US7448066B2 (en)* | 2002-09-19 | 2008-11-04 | International Business Machines Corporation | Application server object-level security for distributed computing domains |
| US7665125B2 (en)* | 2002-09-23 | 2010-02-16 | Heard Robert W | System and method for distribution of security policies for mobile devices |
| US7437752B2 (en)* | 2002-09-23 | 2008-10-14 | Credant Technologies, Inc. | Client architecture for portable device with security policies |
| US20060190984A1 (en)* | 2002-09-23 | 2006-08-24 | Credant Technologies, Inc. | Gatekeeper architecture/features to support security policy maintenance and distribution |
| US7665118B2 (en)* | 2002-09-23 | 2010-02-16 | Credant Technologies, Inc. | Server, computer memory, and method to support security policy maintenance and distribution |
| JP4400059B2 (en)* | 2002-10-17 | 2010-01-20 | 株式会社日立製作所 | Policy setting support tool |
| US6850943B2 (en)* | 2002-10-18 | 2005-02-01 | Check Point Software Technologies, Inc. | Security system and methodology for providing indirect access control |
| US7305432B2 (en)* | 2002-10-23 | 2007-12-04 | Aol Llc | Privacy preferences roaming and enforcement |
| US7546633B2 (en)* | 2002-10-25 | 2009-06-09 | Microsoft Corporation | Role-based authorization management framework |
| US20040083386A1 (en)* | 2002-10-28 | 2004-04-29 | Bertrand Marquet | Non-repudiable distributed security policy synchronization |
| GB0225143D0 (en)* | 2002-10-29 | 2002-12-11 | British Telecomm | Conflict detection in rule sets |
| US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
| ATE540373T1 (en)* | 2002-11-29 | 2012-01-15 | Sap Ag | METHOD AND COMPUTER SYSTEM FOR PROTECTING ELECTRONIC DOCUMENTS |
| CN1417690A (en)* | 2002-12-03 | 2003-05-14 | 南京金鹰国际集团软件系统有限公司 | Application process audit platform system based on members |
| US20040107274A1 (en)* | 2002-12-03 | 2004-06-03 | Mastrianni Steven J. | Policy-based connectivity |
| JP4346898B2 (en)* | 2002-12-09 | 2009-10-21 | Necインフロンティア株式会社 | Maintenance interface user authentication method and apparatus in client-server distributed system |
| US20040123105A1 (en)* | 2002-12-19 | 2004-06-24 | International Business Machines Corporation | Security object with CPU attributes |
| US7890990B1 (en)* | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
| US7577838B1 (en) | 2002-12-20 | 2009-08-18 | Alain Rossmann | Hybrid systems for securing digital assets |
| US9503470B2 (en) | 2002-12-24 | 2016-11-22 | Fred Herz Patents, LLC | Distributed agent based model for security monitoring and response |
| US8327442B2 (en) | 2002-12-24 | 2012-12-04 | Herz Frederick S M | System and method for a distributed application and network security system (SDI-SCAM) |
| US7421500B2 (en)* | 2003-01-10 | 2008-09-02 | Hewlett-Packard Development Company, L.P. | Grid computing control system |
| US20040143749A1 (en)* | 2003-01-16 | 2004-07-22 | Platformlogic, Inc. | Behavior-based host-based intrusion prevention system |
| FR2850503B1 (en)* | 2003-01-23 | 2005-04-08 | Everbee Networks | METHOD AND DYNAMIC SYSTEM FOR SECURING A COMMUNICATION NETWORK USING PORTABLE AGENTS |
| WO2004070590A1 (en)* | 2003-02-04 | 2004-08-19 | Fujitsu Limited | Software maintenance service providing system, software maintenance service method, and program for causing computer to execute the method |
| US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
| US7591000B2 (en) | 2003-02-14 | 2009-09-15 | Oracle International Corporation | System and method for hierarchical role-based entitlements |
| US6917975B2 (en)* | 2003-02-14 | 2005-07-12 | Bea Systems, Inc. | Method for role and resource policy management |
| US8831966B2 (en) | 2003-02-14 | 2014-09-09 | Oracle International Corporation | Method for delegated administration |
| US7653930B2 (en) | 2003-02-14 | 2010-01-26 | Bea Systems, Inc. | Method for role and resource policy management optimization |
| US7293286B2 (en) | 2003-02-20 | 2007-11-06 | Bea Systems, Inc. | Federated management of content repositories |
| US20040167871A1 (en)* | 2003-02-20 | 2004-08-26 | Bea Systems, Inc. | Content mining for virtual content repositories |
| US7562298B2 (en)* | 2003-02-20 | 2009-07-14 | Bea Systems, Inc. | Virtual content repository browser |
| US7415478B2 (en)* | 2003-02-20 | 2008-08-19 | Bea Systems, Inc. | Virtual repository complex content model |
| US7840614B2 (en) | 2003-02-20 | 2010-11-23 | Bea Systems, Inc. | Virtual content repository application program interface |
| US7483904B2 (en)* | 2003-02-20 | 2009-01-27 | Bea Systems, Inc. | Virtual repository content model |
| US7810036B2 (en) | 2003-02-28 | 2010-10-05 | Bea Systems, Inc. | Systems and methods for personalizing a portal |
| US20040230917A1 (en)* | 2003-02-28 | 2004-11-18 | Bales Christopher E. | Systems and methods for navigating a graphical hierarchy |
| US20040230557A1 (en)* | 2003-02-28 | 2004-11-18 | Bales Christopher E. | Systems and methods for context-sensitive editing |
| US7437441B1 (en)* | 2003-02-28 | 2008-10-14 | Microsoft Corporation | Using deltas for efficient policy distribution |
| US7150044B2 (en)* | 2003-03-10 | 2006-12-12 | Mci, Llc | Secure self-organizing and self-provisioning anomalous event detection systems |
| US7370066B1 (en) | 2003-03-24 | 2008-05-06 | Microsoft Corporation | System and method for offline editing of data files |
| US7415672B1 (en) | 2003-03-24 | 2008-08-19 | Microsoft Corporation | System and method for designing electronic forms |
| US7275216B2 (en)* | 2003-03-24 | 2007-09-25 | Microsoft Corporation | System and method for designing electronic forms and hierarchical schemas |
| US7296017B2 (en)* | 2003-03-28 | 2007-11-13 | Microsoft Corporation | Validation of XML data files |
| US7913159B2 (en) | 2003-03-28 | 2011-03-22 | Microsoft Corporation | System and method for real-time validation of structured data files |
| US7516145B2 (en) | 2003-03-31 | 2009-04-07 | Microsoft Corporation | System and method for incrementally transforming and rendering hierarchical data files |
| US8136155B2 (en)* | 2003-04-01 | 2012-03-13 | Check Point Software Technologies, Inc. | Security system with methodology for interprocess communication control |
| US7783672B2 (en)* | 2003-04-09 | 2010-08-24 | Microsoft Corporation | Support mechanisms for improved group policy management user interface |
| US20050010807A1 (en)* | 2003-04-10 | 2005-01-13 | Ken Kitamura | Information processing apparatus used by a plurality of different operators, and method and program for use in the information processing apparatus |
| US8612590B1 (en) | 2003-04-11 | 2013-12-17 | International Business Machines Corporation | Method and apparatus for access management |
| US7370344B2 (en)* | 2003-04-14 | 2008-05-06 | Sas Institute Inc. | Computer-implemented data access security system and method |
| US7522908B2 (en) | 2003-04-21 | 2009-04-21 | Airdefense, Inc. | Systems and methods for wireless network site survey |
| US7324804B2 (en) | 2003-04-21 | 2008-01-29 | Airdefense, Inc. | Systems and methods for dynamic sensor discovery and selection |
| US7355996B2 (en)* | 2004-02-06 | 2008-04-08 | Airdefense, Inc. | Systems and methods for adaptive monitoring with bandwidth constraints |
| US7359676B2 (en) | 2003-04-21 | 2008-04-15 | Airdefense, Inc. | Systems and methods for adaptively scanning for wireless communications |
| US7496953B2 (en)* | 2003-04-29 | 2009-02-24 | International Business Machines Corporation | Single sign-on method for web-based applications |
| US7900038B2 (en)* | 2003-04-29 | 2011-03-01 | Wells Fargo Bank, N.A. | Method and apparatus for a broker entity |
| US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
| US7299492B2 (en)* | 2003-06-12 | 2007-11-20 | International Business Machines Corporation | Multi-level multi-user web services security system and method |
| CA2432667A1 (en)* | 2003-06-17 | 2004-12-17 | Ibm Canada Limited - Ibm Canada Limitee | Method and system for granting user privileges in electronic commerce security domains |
| US20040267897A1 (en)* | 2003-06-24 | 2004-12-30 | Sychron Inc. | Distributed System Providing Scalable Methodology for Real-Time Control of Server Pools and Data Centers |
| US20040268229A1 (en)* | 2003-06-27 | 2004-12-30 | Microsoft Corporation | Markup language editing with an electronic form |
| US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
| US7451392B1 (en)* | 2003-06-30 | 2008-11-11 | Microsoft Corporation | Rendering an HTML electronic form by applying XSLT to XML using a solution |
| US7788726B2 (en)* | 2003-07-02 | 2010-08-31 | Check Point Software Technologies, Inc. | System and methodology providing information lockbox |
| US20050028008A1 (en)* | 2003-07-29 | 2005-02-03 | Kumar Anil N. | System for accessing digital assets |
| US7406660B1 (en)* | 2003-08-01 | 2008-07-29 | Microsoft Corporation | Mapping between structured data and a visual surface |
| US7581177B1 (en) | 2003-08-01 | 2009-08-25 | Microsoft Corporation | Conversion of structured documents |
| US7334187B1 (en) | 2003-08-06 | 2008-02-19 | Microsoft Corporation | Electronic form aggregation |
| US7555558B1 (en) | 2003-08-15 | 2009-06-30 | Michael Frederick Kenrich | Method and system for fault-tolerant transfer of files across a network |
| US7895234B2 (en)* | 2003-09-22 | 2011-02-22 | Rockwell Automation Technologies, Inc. | Systems and methods for sharing portal configurations |
| US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
| US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
| US7349966B2 (en)* | 2003-09-30 | 2008-03-25 | International Business Machines Corporation | Method, system, and storage medium for providing context-based dynamic policy assignment in a distributed processing environment |
| US7340447B2 (en)* | 2003-10-09 | 2008-03-04 | Oracle International Corporation | Partitioning data access requests |
| US7904487B2 (en) | 2003-10-09 | 2011-03-08 | Oracle International Corporation | Translating data access requests |
| US7882132B2 (en) | 2003-10-09 | 2011-02-01 | Oracle International Corporation | Support for RDBMS in LDAP system |
| US20050257245A1 (en)* | 2003-10-10 | 2005-11-17 | Bea Systems, Inc. | Distributed security system with dynamic roles |
| US20050262362A1 (en)* | 2003-10-10 | 2005-11-24 | Bea Systems, Inc. | Distributed security system policies |
| US7603548B2 (en)* | 2003-10-10 | 2009-10-13 | Bea Systems, Inc. | Security provider development model |
| US20050251851A1 (en)* | 2003-10-10 | 2005-11-10 | Bea Systems, Inc. | Configuration of a distributed security system |
| US7644432B2 (en)* | 2003-10-10 | 2010-01-05 | Bea Systems, Inc. | Policy inheritance through nested groups |
| US20050097353A1 (en)* | 2003-10-10 | 2005-05-05 | Bea Systems, Inc. | Policy analysis tool |
| US20050097352A1 (en)* | 2003-10-10 | 2005-05-05 | Bea Systems, Inc. | Embeddable security service module |
| US8122128B2 (en)* | 2003-11-18 | 2012-02-21 | Burke Ii Robert M | System for regulating access to and distributing content in a network |
| US7533413B2 (en)* | 2003-12-05 | 2009-05-12 | Microsoft Corporation | Method and system for processing events |
| US7430760B2 (en)* | 2003-12-05 | 2008-09-30 | Microsoft Corporation | Security-related programming interface |
| US7661123B2 (en)* | 2003-12-05 | 2010-02-09 | Microsoft Corporation | Security policy update supporting at least one security service provider |
| US7454496B2 (en)* | 2003-12-10 | 2008-11-18 | International Business Machines Corporation | Method for monitoring data resources of a data processing network |
| US7284000B2 (en)* | 2003-12-19 | 2007-10-16 | International Business Machines Corporation | Automatic policy generation based on role entitlements and identity attributes |
| US8635661B2 (en)* | 2003-12-23 | 2014-01-21 | Mcafee, Inc. | System and method for enforcing a security policy on mobile devices using dynamically generated security profiles |
| US7506371B1 (en)* | 2004-01-22 | 2009-03-17 | Guardium, Inc. | System and methods for adaptive behavior based access control |
| US8156175B2 (en) | 2004-01-23 | 2012-04-10 | Tiversa Inc. | System and method for searching for specific types of people or information on a peer-to-peer network |
| US8819072B1 (en) | 2004-02-02 | 2014-08-26 | Microsoft Corporation | Promoting data from structured data files |
| US7430711B2 (en) | 2004-02-17 | 2008-09-30 | Microsoft Corporation | Systems and methods for editing XML documents |
| US20050182958A1 (en)* | 2004-02-17 | 2005-08-18 | Duc Pham | Secure, real-time application execution control system and methods |
| US7761923B2 (en) | 2004-03-01 | 2010-07-20 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
| US7774601B2 (en)* | 2004-04-06 | 2010-08-10 | Bea Systems, Inc. | Method for delegated administration |
| US20050251503A1 (en)* | 2004-04-13 | 2005-11-10 | Bea Systems, Inc. | System and method for content and schema versioning |
| US7475091B2 (en) | 2004-04-13 | 2009-01-06 | Bea Systems, Inc. | System and method for viewing a virtual content repository |
| US7580953B2 (en)* | 2004-04-13 | 2009-08-25 | Bea Systems, Inc. | System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories |
| US20050251512A1 (en)* | 2004-04-13 | 2005-11-10 | Bea Systems, Inc. | System and method for searching a virtual content repository |
| US20050228784A1 (en)* | 2004-04-13 | 2005-10-13 | Bea Systems, Inc. | System and method for batch operations in a virtual content repository |
| US8190714B2 (en)* | 2004-04-15 | 2012-05-29 | Raytheon Company | System and method for computer cluster virtualization using dynamic boot images and virtual disk |
| US8336040B2 (en) | 2004-04-15 | 2012-12-18 | Raytheon Company | System and method for topology-aware job scheduling and backfilling in an HPC environment |
| US9178784B2 (en) | 2004-04-15 | 2015-11-03 | Raytheon Company | System and method for cluster management based on HPC architecture |
| US8335909B2 (en) | 2004-04-15 | 2012-12-18 | Raytheon Company | Coupling processors to each other for high performance computing (HPC) |
| US7496837B1 (en)* | 2004-04-29 | 2009-02-24 | Microsoft Corporation | Structural editing with schema awareness |
| US7568101B1 (en) | 2004-05-13 | 2009-07-28 | Microsoft Corporation | Digital signatures with an embedded view |
| US7774620B1 (en) | 2004-05-27 | 2010-08-10 | Microsoft Corporation | Executing applications at appropriate trust levels |
| US7650627B1 (en)* | 2004-05-28 | 2010-01-19 | Sap Ag | Abstract configuration files for efficient implementation of security services |
| US7271721B2 (en)* | 2004-05-28 | 2007-09-18 | Lockheed Martin Corporation | Protected distribution system |
| US7707427B1 (en) | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
| US7353390B2 (en) | 2004-08-20 | 2008-04-01 | Microsoft Corporation | Enabling network devices within a virtual network to communicate while the networks's communications are restricted due to security threats |
| US8098158B2 (en)* | 2004-09-01 | 2012-01-17 | Microsoft Corporation | RFID server internals design |
| US8217756B2 (en) | 2004-09-01 | 2012-07-10 | Microsoft Corporation | Rule-based filtering and alerting |
| US7944355B2 (en)* | 2004-09-01 | 2011-05-17 | Microsoft Corporation | Security techniques in the RFID framework |
| US7333800B1 (en)* | 2004-09-08 | 2008-02-19 | Airtight Networks, Inc. | Method and system for scheduling of sensor functions for monitoring of wireless communication activity |
| WO2006036991A2 (en)* | 2004-09-24 | 2006-04-06 | Encomia, L.P. | A method and system for building audit rule sets for electronic auditing of documents |
| US7630974B2 (en) | 2004-09-28 | 2009-12-08 | Oracle International Corporation | Multi-language support for enterprise identity and access management |
| US7516399B2 (en)* | 2004-09-30 | 2009-04-07 | Microsoft Corporation | Structured-document path-language expression methods and systems |
| US20060074933A1 (en)* | 2004-09-30 | 2006-04-06 | Microsoft Corporation | Workflow interaction |
| US7692636B2 (en)* | 2004-09-30 | 2010-04-06 | Microsoft Corporation | Systems and methods for handwriting to a screen |
| US7421739B2 (en)* | 2004-10-04 | 2008-09-02 | American Express Travel Related Services Company, Inc. | System and method for monitoring and ensuring data integrity in an enterprise security system |
| US7752671B2 (en)* | 2004-10-04 | 2010-07-06 | Promisec Ltd. | Method and device for questioning a plurality of computerized devices |
| AU2005295001A1 (en)* | 2004-10-08 | 2006-04-20 | Approva Corporation | Systems and methods for monitoring business processes of enterprise applications |
| US8196199B2 (en) | 2004-10-19 | 2012-06-05 | Airdefense, Inc. | Personal wireless monitoring agent |
| US7698731B2 (en)* | 2004-10-25 | 2010-04-13 | Panasonic Corporation | Security architecture and mechanism to access and use security components in operating system |
| US8487879B2 (en)* | 2004-10-29 | 2013-07-16 | Microsoft Corporation | Systems and methods for interacting with a computer through handwriting to a screen |
| US8078707B1 (en)* | 2004-11-12 | 2011-12-13 | Juniper Networks, Inc. | Network management using hierarchical domains |
| US7712022B2 (en) | 2004-11-15 | 2010-05-04 | Microsoft Corporation | Mutually exclusive options in electronic forms |
| US20060107224A1 (en)* | 2004-11-15 | 2006-05-18 | Microsoft Corporation | Building a dynamic action for an electronic form |
| US7584417B2 (en)* | 2004-11-15 | 2009-09-01 | Microsoft Corporation | Role-dependent action for an electronic form |
| US7509353B2 (en)* | 2004-11-16 | 2009-03-24 | Microsoft Corporation | Methods and systems for exchanging and rendering forms |
| US7721190B2 (en) | 2004-11-16 | 2010-05-18 | Microsoft Corporation | Methods and systems for server side form processing |
| US7433931B2 (en) | 2004-11-17 | 2008-10-07 | Raytheon Company | Scheduling in a high-performance computing (HPC) system |
| US8244882B2 (en) | 2004-11-17 | 2012-08-14 | Raytheon Company | On-demand instantiation in a high-performance computing (HPC) system |
| US7904801B2 (en)* | 2004-12-15 | 2011-03-08 | Microsoft Corporation | Recursive sections in electronic forms |
| US7437376B2 (en)* | 2004-12-20 | 2008-10-14 | Microsoft Corporation | Scalable object model |
| US7603494B2 (en)* | 2005-01-05 | 2009-10-13 | At&T Intellectual Property I, L.P. | Home networking resource management |
| US7620974B2 (en)* | 2005-01-12 | 2009-11-17 | Symantec | Distributed traffic scanning through data stream security tagging |
| US7788497B2 (en)* | 2005-01-13 | 2010-08-31 | Bea Systems, Inc. | Credential mapping of WebLogic and database user ids |
| US7937651B2 (en)* | 2005-01-14 | 2011-05-03 | Microsoft Corporation | Structural editing operations for network forms |
| US8495700B2 (en) | 2005-02-28 | 2013-07-23 | Mcafee, Inc. | Mobile data security system and methods |
| US8565726B2 (en) | 2008-11-06 | 2013-10-22 | Mcafee, Inc. | System, method and device for mediating connections between policy source servers, corporate repositories, and mobile devices |
| US7725834B2 (en)* | 2005-03-04 | 2010-05-25 | Microsoft Corporation | Designer-created aspect for an electronic form template |
| JP4704780B2 (en)* | 2005-03-24 | 2011-06-22 | 株式会社日立製作所 | Computer system, storage device, computer software, and administrator authentication method in storage control |
| US8086615B2 (en)* | 2005-03-28 | 2011-12-27 | Oracle International Corporation | Security data redaction |
| US20060224628A1 (en)* | 2005-03-29 | 2006-10-05 | Bea Systems, Inc. | Modeling for data services |
| US7644086B2 (en) | 2005-03-29 | 2010-01-05 | Sas Institute Inc. | Computer-implemented authorization systems and methods using associations |
| US7673228B2 (en)* | 2005-03-30 | 2010-03-02 | Microsoft Corporation | Data-driven actions for network forms |
| US8010515B2 (en)* | 2005-04-15 | 2011-08-30 | Microsoft Corporation | Query to an electronic form |
| ITTO20050289A1 (en)* | 2005-04-29 | 2006-10-30 | Garelli Francesco | SYSTEM AND METHOD FOR THE ACTIVE PROTECTION OF DATA IN AN INFORMATION SYSTEM AFTER A REQUEST FOR ACCESS TO A RESOURCE AVAILABLE IN THE IT SYSTEM ITSELF |
| US7748027B2 (en)* | 2005-05-11 | 2010-06-29 | Bea Systems, Inc. | System and method for dynamic data redaction |
| EP1897019A4 (en)* | 2005-05-13 | 2011-10-05 | Cryptomill Technologies Ltd | Cryptographic control for mobile storage means |
| AU2006246222A1 (en) | 2005-05-13 | 2006-11-16 | Cryptomill | Content cryptographic firewall system |
| US20060277594A1 (en)* | 2005-06-02 | 2006-12-07 | International Business Machines Corporation | Policy implementation delegation |
| US7483896B2 (en)* | 2005-06-06 | 2009-01-27 | Oracle International Corporation | Architecture for computer-implemented authentication and authorization |
| US7793333B2 (en)* | 2005-06-13 | 2010-09-07 | International Business Machines Corporation | Mobile authorization using policy based access control |
| US20070011665A1 (en)* | 2005-06-21 | 2007-01-11 | Microsoft Corporation | Content syndication platform |
| US7543228B2 (en)* | 2005-06-27 | 2009-06-02 | Microsoft Corporation | Template for rendering an electronic form |
| US8200975B2 (en)* | 2005-06-29 | 2012-06-12 | Microsoft Corporation | Digital signatures for network forms |
| CN100461690C (en)* | 2005-07-21 | 2009-02-11 | 华为技术有限公司 | General Network Management Security Management System and Method |
| US20070101424A1 (en)* | 2005-07-25 | 2007-05-03 | Nec Laboratories America, Inc. | Apparatus and Method for Improving Security of a Bus Based System Through Communication Architecture Enhancements |
| US7970788B2 (en)* | 2005-08-02 | 2011-06-28 | International Business Machines Corporation | Selective local database access restriction |
| US7613996B2 (en)* | 2005-08-15 | 2009-11-03 | Microsoft Corporation | Enabling selection of an inferred schema part |
| US20070036433A1 (en)* | 2005-08-15 | 2007-02-15 | Microsoft Corporation | Recognizing data conforming to a rule |
| US20070061706A1 (en)* | 2005-09-14 | 2007-03-15 | Microsoft Corporation | Mapping property hierarchies to schemas |
| US20070061467A1 (en)* | 2005-09-15 | 2007-03-15 | Microsoft Corporation | Sessions and session states |
| US7483893B2 (en) | 2005-09-26 | 2009-01-27 | Bae Systems, Inc. | System and method for lightweight loading for managing content |
| US7818344B2 (en) | 2005-09-26 | 2010-10-19 | Bea Systems, Inc. | System and method for providing nested types for content management |
| US7953734B2 (en) | 2005-09-26 | 2011-05-31 | Oracle International Corporation | System and method for providing SPI extensions for content management system |
| US7917537B2 (en) | 2005-09-26 | 2011-03-29 | Oracle International Corporation | System and method for providing link property types for content management |
| US7752205B2 (en) | 2005-09-26 | 2010-07-06 | Bea Systems, Inc. | Method and system for interacting with a virtual content repository |
| US8997246B2 (en)* | 2005-10-04 | 2015-03-31 | Disney Enterprises, Inc. | System and/or method for authentication and/or authorization via a network |
| US8166404B2 (en) | 2005-10-04 | 2012-04-24 | Disney Enterprises, Inc. | System and/or method for authentication and/or authorization |
| US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
| US20070079357A1 (en)* | 2005-10-04 | 2007-04-05 | Disney Enterprises, Inc. | System and/or method for role-based authorization |
| US7647625B2 (en)* | 2005-10-04 | 2010-01-12 | Disney Enterprises, Inc. | System and/or method for class-based authorization |
| US7725737B2 (en)* | 2005-10-14 | 2010-05-25 | Check Point Software Technologies, Inc. | System and methodology providing secure workspace environment |
| US8141138B2 (en)* | 2005-10-17 | 2012-03-20 | Oracle International Corporation | Auditing correlated events using a secure web single sign-on login |
| US7484173B2 (en)* | 2005-10-18 | 2009-01-27 | International Business Machines Corporation | Alternative key pad layout for enhanced security |
| US7802267B2 (en)* | 2005-11-03 | 2010-09-21 | Microsoft Corporation | Compliance interface for compliant applications |
| US7933923B2 (en)* | 2005-11-04 | 2011-04-26 | International Business Machines Corporation | Tracking and reconciling database commands |
| US7693838B2 (en)* | 2005-11-12 | 2010-04-06 | Intel Corporation | Method and apparatus for securely accessing data |
| EP2650749A1 (en)* | 2005-11-17 | 2013-10-16 | Koninklijke Philips N.V. | System for Managing Access Control |
| US8045958B2 (en) | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
| US8024794B1 (en)* | 2005-11-30 | 2011-09-20 | Amdocs Software Systems Limited | Dynamic role based authorization system and method |
| US8001459B2 (en)* | 2005-12-05 | 2011-08-16 | Microsoft Corporation | Enabling electronic documents for limited-capability computing devices |
| US20070136197A1 (en)* | 2005-12-13 | 2007-06-14 | Morris Robert P | Methods, systems, and computer program products for authorizing a service request based on account-holder-configured authorization rules |
| US7577424B2 (en) | 2005-12-19 | 2009-08-18 | Airdefense, Inc. | Systems and methods for wireless vulnerability analysis |
| US8321437B2 (en)* | 2005-12-29 | 2012-11-27 | Nextlabs, Inc. | Detecting behavioral patterns and anomalies using activity profiles |
| US8407240B2 (en)* | 2006-01-03 | 2013-03-26 | International Business Machines Corporation | Autonomic self-healing network |
| US8688813B2 (en) | 2006-01-11 | 2014-04-01 | Oracle International Corporation | Using identity/resource profile and directory enablers to support identity management |
| US7715800B2 (en) | 2006-01-13 | 2010-05-11 | Airdefense, Inc. | Systems and methods for wireless intrusion detection using spectral analysis |
| US8214296B2 (en)* | 2006-02-14 | 2012-07-03 | Microsoft Corporation | Disaggregated secure execution environment |
| DE602006006787D1 (en)* | 2006-02-27 | 2009-06-25 | Research In Motion Ltd | Method for personalizing a standardized IT policy |
| US7970899B2 (en)* | 2006-03-03 | 2011-06-28 | Barracuda Networks Inc | Integrated data flow packet admission and traffic management apparatus |
| US20070220009A1 (en)* | 2006-03-15 | 2007-09-20 | Morris Robert P | Methods, systems, and computer program products for controlling access to application data |
| US7971251B2 (en) | 2006-03-17 | 2011-06-28 | Airdefense, Inc. | Systems and methods for wireless security using distributed collaboration of wireless clients |
| WO2007123753A2 (en) | 2006-03-30 | 2007-11-01 | Invensys Systems, Inc. | Digital data processing apparatus and methods for improving plant performance |
| US20070268163A1 (en)* | 2006-04-27 | 2007-11-22 | Snocap, Inc. | System, method and computer program product for facilitating e-commerce involving digital assets |
| US20070282714A1 (en)* | 2006-04-27 | 2007-12-06 | Snocap, Inc. | System, method and computer program product for providing an e-commerce interface on a web page to facilitate e-commerce involving digital assets |
| US20070279262A1 (en)* | 2006-04-27 | 2007-12-06 | Snocap, Inc. | Automated right-holders registration system, method and computer program product for facilitating e-commerce involving digital assets |
| WO2007130975A2 (en) | 2006-05-01 | 2007-11-15 | Approva Corporation | Managing controls wtthin a heterogeneous enterprise environment |
| US9405564B2 (en) | 2006-05-10 | 2016-08-02 | The Mathworks, Inc. | System and method for targeting commands to concurrent computing units executing a concurrent computing process |
| US7631168B1 (en) | 2006-05-10 | 2009-12-08 | The Math Works, Inc. | Graphical interface for grouping concurrent computing units executing a concurrent computing process |
| US20070294404A1 (en)* | 2006-06-15 | 2007-12-20 | International Business Machines Corporation | Method and system for authorization and access control delegation in an on demand grid environment |
| US7970013B2 (en) | 2006-06-16 | 2011-06-28 | Airdefense, Inc. | Systems and methods for wireless network content filtering |
| US8086635B1 (en)* | 2006-06-20 | 2011-12-27 | Verizon Business Global Llc | Compliance monitoring |
| JP4539613B2 (en)* | 2006-06-28 | 2010-09-08 | 富士ゼロックス株式会社 | Image forming apparatus, image generation method, and program |
| US20080034412A1 (en)* | 2006-08-02 | 2008-02-07 | Informed Control Inc. | System to prevent misuse of access rights in a single sign on environment |
| US8484718B2 (en)* | 2006-08-03 | 2013-07-09 | Citrix System, Inc. | Systems and methods for enabling assured records using fine grained auditing of virtual private network traffic |
| US8281392B2 (en) | 2006-08-11 | 2012-10-02 | Airdefense, Inc. | Methods and systems for wired equivalent privacy and Wi-Fi protected access protection |
| US20080216142A1 (en)* | 2006-08-17 | 2008-09-04 | Goldberg Brett M | System and method of digital media distribution |
| US7904953B2 (en)* | 2006-09-22 | 2011-03-08 | Bea Systems, Inc. | Pagelets |
| US7761468B2 (en)* | 2006-10-04 | 2010-07-20 | International Business Machines Corporation | Supporting multiple security mechanisms in a database driver |
| US8463852B2 (en) | 2006-10-06 | 2013-06-11 | Oracle International Corporation | Groupware portlets for integrating a portal with groupware systems |
| US8259568B2 (en) | 2006-10-23 | 2012-09-04 | Mcafee, Inc. | System and method for controlling mobile device access to a network |
| JP2008108844A (en)* | 2006-10-24 | 2008-05-08 | Toyota Central R&D Labs Inc | Group III nitride semiconductor device having trench structure or mesa structure and method for manufacturing the same |
| US20080126287A1 (en)* | 2006-11-03 | 2008-05-29 | Motorola, Inc. | Method for management of policy conflict in a policy continuum |
| US7804774B2 (en) | 2006-12-01 | 2010-09-28 | Sonus Networks, Inc. | Scalable filtering and policing mechanism for protecting user traffic in a network |
| US7672336B2 (en)* | 2006-12-01 | 2010-03-02 | Sonus Networks, Inc. | Filtering and policing for defending against denial of service attacks on a network |
| US7940657B2 (en)* | 2006-12-01 | 2011-05-10 | Sonus Networks, Inc. | Identifying attackers on a network |
| JP2011503912A (en)* | 2006-12-01 | 2011-01-27 | ソーナス ネットワークス, インコーポレイテッド | Information screening and monitoring restrictions for defense against network denial of service attacks |
| US8141100B2 (en) | 2006-12-20 | 2012-03-20 | International Business Machines Corporation | Identifying attribute propagation for multi-tier processing |
| US8869233B2 (en)* | 2006-12-22 | 2014-10-21 | Verizon Patent And Licensing Inc. | Policy management within a network management system |
| US20080177790A1 (en)* | 2007-01-19 | 2008-07-24 | Mangesh Krishnarao Honwad | Distributed records management system |
| US8095517B2 (en)* | 2007-02-08 | 2012-01-10 | Blue Coat Systems, Inc. | Method and system for policy-based protection of application data |
| US8495367B2 (en) | 2007-02-22 | 2013-07-23 | International Business Machines Corporation | Nondestructive interception of secure data in transit |
| US20080263678A1 (en)* | 2007-04-20 | 2008-10-23 | Thomas Kroll | Path Protection |
| CN101325509B (en) | 2007-06-11 | 2011-04-06 | 华为技术有限公司 | Method, system and apparatus for installing software components |
| US8245271B2 (en)* | 2007-08-15 | 2012-08-14 | Oracle International Corporation | Scope-centric access control model |
| US8539568B1 (en) | 2007-10-03 | 2013-09-17 | Courion Corporation | Identity map creation |
| WO2009076447A1 (en)* | 2007-12-10 | 2009-06-18 | Courion Corporaton | Policy enforcement using esso |
| US20090157686A1 (en)* | 2007-12-13 | 2009-06-18 | Oracle International Corporation | Method and apparatus for efficiently caching a system-wide access control list |
| US20090178131A1 (en) | 2008-01-08 | 2009-07-09 | Microsoft Corporation | Globally distributed infrastructure for secure content management |
| US8296820B2 (en)* | 2008-01-18 | 2012-10-23 | International Business Machines Corporation | Applying security policies to multiple systems and controlling policy propagation |
| US20090249493A1 (en)* | 2008-03-27 | 2009-10-01 | Computer Associates Think, Inc. | Method and System for Determining Software License Compliance |
| US8725647B2 (en)* | 2008-03-27 | 2014-05-13 | Ca, Inc. | Method and system for determining software license compliance |
| US7930760B2 (en)* | 2008-04-01 | 2011-04-19 | Microsoft Corporation | Centralized enforcement of name-based computer system security rules |
| US8261326B2 (en)* | 2008-04-25 | 2012-09-04 | International Business Machines Corporation | Network intrusion blocking security overlay |
| US8910255B2 (en)* | 2008-05-27 | 2014-12-09 | Microsoft Corporation | Authentication for distributed secure content management system |
| US8863278B2 (en)* | 2008-05-28 | 2014-10-14 | International Business Machines Corporation | Grid security intrusion detection configuration mechanism |
| US20140201017A1 (en) | 2008-06-19 | 2014-07-17 | Servicemesh, Inc. | Systems and methods for providing repeated use of computing resources |
| EP2316071A4 (en) | 2008-06-19 | 2011-08-17 | Servicemesh Inc | CLOUD COMPUTER GATEWAY, CLOUD COMPUTER HYPERVISOR AND METHODS OF IMPLEMENTING THE SAME |
| US10411975B2 (en) | 2013-03-15 | 2019-09-10 | Csc Agility Platform, Inc. | System and method for a cloud computing abstraction with multi-tier deployment policy |
| US9489647B2 (en) | 2008-06-19 | 2016-11-08 | Csc Agility Platform, Inc. | System and method for a cloud computing abstraction with self-service portal for publishing resources |
| US9069599B2 (en) | 2008-06-19 | 2015-06-30 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer with security zone facilities |
| EP2304536A4 (en) | 2008-06-20 | 2012-08-15 | Invensys Sys Inc | Systems and methods for immersive interaction with actual and/or simulated facilities for process, environmental and industrial control |
| US8646027B2 (en)* | 2008-06-27 | 2014-02-04 | Microsoft Corporation | Workflow based authorization for content access |
| US7921089B2 (en)* | 2008-07-24 | 2011-04-05 | Zscaler, Inc. | Feature based data management |
| US8566961B2 (en)* | 2008-08-08 | 2013-10-22 | Absolute Software Corporation | Approaches for a location aware client |
| US8095972B1 (en) | 2008-10-06 | 2012-01-10 | Southern Company Services, Inc. | Secure authentication for web-based applications |
| US20100125891A1 (en)* | 2008-11-17 | 2010-05-20 | Prakash Baskaran | Activity Monitoring And Information Protection |
| US9026456B2 (en)* | 2009-01-16 | 2015-05-05 | Oracle International Corporation | Business-responsibility-centric identity management |
| US8555378B2 (en)* | 2009-03-11 | 2013-10-08 | Sas Institute Inc. | Authorization caching in a multithreaded object server |
| US9705888B2 (en)* | 2009-03-31 | 2017-07-11 | Amazon Technologies, Inc. | Managing security groups for data instances |
| US8713060B2 (en) | 2009-03-31 | 2014-04-29 | Amazon Technologies, Inc. | Control service for relational data management |
| US9207984B2 (en) | 2009-03-31 | 2015-12-08 | Amazon Technologies, Inc. | Monitoring and automatic scaling of data volumes |
| CN101572630B (en)* | 2009-05-22 | 2012-02-08 | 中兴通讯股份有限公司 | Privilege management system and method based on objects |
| US8463964B2 (en) | 2009-05-29 | 2013-06-11 | Invensys Systems, Inc. | Methods and apparatus for control configuration with enhanced change-tracking |
| US8127060B2 (en) | 2009-05-29 | 2012-02-28 | Invensys Systems, Inc | Methods and apparatus for control configuration with control objects that are fieldbus protocol-aware |
| US8966017B2 (en) | 2009-07-09 | 2015-02-24 | Novell, Inc. | Techniques for cloud control and management |
| US8489685B2 (en) | 2009-07-17 | 2013-07-16 | Aryaka Networks, Inc. | Application acceleration as a service system and method |
| US9396465B2 (en)* | 2009-07-22 | 2016-07-19 | Visa International Service Association | Apparatus including data bearing medium for reducing fraud in payment transactions using a black list |
| US20110022518A1 (en)* | 2009-07-22 | 2011-01-27 | Ayman Hammad | Apparatus including data bearing medium for seasoning a device using data obtained from multiple transaction environments |
| US8250628B2 (en)* | 2009-08-28 | 2012-08-21 | International Business Machines Corporation | Dynamic augmentation, reduction, and/or replacement of security information by evaluating logical expressions |
| US9135283B2 (en) | 2009-10-07 | 2015-09-15 | Amazon Technologies, Inc. | Self-service configuration for data environment |
| US8676753B2 (en) | 2009-10-26 | 2014-03-18 | Amazon Technologies, Inc. | Monitoring of replicated data instances |
| US20110113474A1 (en)* | 2009-11-11 | 2011-05-12 | International Business Machines Corporation | Network system security managment |
| WO2011092686A1 (en)* | 2010-01-27 | 2011-08-04 | Varonis Systems, Inc. | Time dependent access permissions |
| US20110213711A1 (en)* | 2010-03-01 | 2011-09-01 | Entrust, Inc. | Method, system and apparatus for providing transaction verification |
| US8868728B2 (en)* | 2010-03-11 | 2014-10-21 | Accenture Global Services Limited | Systems and methods for detecting and investigating insider fraud |
| US8935384B2 (en) | 2010-05-06 | 2015-01-13 | Mcafee Inc. | Distributed data revocation using data commands |
| US8856300B2 (en)* | 2010-05-18 | 2014-10-07 | At&T Intellectual Property I, L.P. | End-to-end secure cloud computing |
| US8474053B2 (en) | 2010-06-07 | 2013-06-25 | International Business Machines Corporation | Data security in a multi-nodal environment |
| CO6350200A1 (en)* | 2010-07-06 | 2011-12-20 | James Byrne | SYSTEMS AND METHODS TO ESTABLISH TRUST BETWEEN ENTITIES AS A TRANSACTION SUPPORT |
| US9095002B2 (en) | 2010-07-12 | 2015-07-28 | Invensys Systems, Inc. | Methods and apparatus for process control with improved communication links |
| US8331855B2 (en) | 2010-07-12 | 2012-12-11 | Invensys Systems, Inc. | Methods and apparatus for process control with improved communication links |
| KR101016617B1 (en)* | 2010-07-26 | 2011-02-22 | 알서포트 주식회사 | Real-time remote determination method of web server access browser |
| US20120072972A1 (en)* | 2010-09-20 | 2012-03-22 | Microsoft Corporation | Secondary credentials for batch system |
| US8893215B2 (en)* | 2010-10-29 | 2014-11-18 | Nokia Corporation | Method and apparatus for providing distributed policy management |
| US9032013B2 (en) | 2010-10-29 | 2015-05-12 | Microsoft Technology Licensing, Llc | Unified policy over heterogenous device types |
| US9237155B1 (en)* | 2010-12-06 | 2016-01-12 | Amazon Technologies, Inc. | Distributed policy enforcement with optimizing policy transformations |
| WO2012100092A2 (en)* | 2011-01-19 | 2012-07-26 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer with security zone facilities |
| US20120204248A1 (en)* | 2011-02-09 | 2012-08-09 | Verizon Patent And Licensing Inc. | Provisioner for single sign-on and non-single sign-on sites, applications, systems, and sessions |
| US8627442B2 (en) | 2011-05-24 | 2014-01-07 | International Business Machines Corporation | Hierarchical rule development and binding for web application server firewall |
| US8769642B1 (en) | 2011-05-31 | 2014-07-01 | Amazon Technologies, Inc. | Techniques for delegation of access privileges |
| US20120310984A1 (en)* | 2011-06-01 | 2012-12-06 | International Business Machines Corporation | Data security for a database in a multi-nodal environment |
| US8756651B2 (en)* | 2011-09-27 | 2014-06-17 | Amazon Technologies, Inc. | Policy compliance-based secure data access |
| US9009857B2 (en)* | 2011-10-28 | 2015-04-14 | Absolute Software Corporation | Temporally controlling access to software assets on user devices |
| US8935804B1 (en) | 2011-12-15 | 2015-01-13 | United Services Automobile Association (Usaa) | Rules-based data access systems and methods |
| AU2012100460B4 (en) | 2012-01-04 | 2012-11-08 | Uniloc Usa, Inc. | Method and system implementing zone-restricted behavior of a computing device |
| AU2012100462B4 (en) | 2012-02-06 | 2012-11-08 | Uniloc Usa, Inc. | Near field authentication through communication of enclosed content sound waves |
| US9256743B2 (en)* | 2012-02-29 | 2016-02-09 | Google Inc. | Remote enterprise policy/client configuration installation for computing devices |
| US9027141B2 (en)* | 2012-04-12 | 2015-05-05 | Netflix, Inc. | Method and system for improving security and reliability in a networked application environment |
| US9747581B2 (en)* | 2012-07-02 | 2017-08-29 | International Business Machines Corporation | Context-dependent transactional management for separation of duties |
| US9100421B2 (en) | 2012-11-12 | 2015-08-04 | International Business Machines Corporation | Enterprise application session control and monitoring in a large distributed environment |
| US8990893B2 (en)* | 2012-11-12 | 2015-03-24 | International Business Machines Corporation | Enterprise application session control and monitoring in a large distributed environment |
| US8990883B2 (en)* | 2013-01-02 | 2015-03-24 | International Business Machines Corporation | Policy-based development and runtime control of mobile applications |
| US9430116B2 (en)* | 2013-02-12 | 2016-08-30 | International Business Machines Corporation | Visualization of runtime resource policy attachments and applied policy details |
| US9088543B2 (en) | 2013-06-03 | 2015-07-21 | International Business Machines Corporation | Coordinated network security management |
| US20150026760A1 (en)* | 2013-07-20 | 2015-01-22 | Keith Lipman | System and Method for Policy-Based Confidentiality Management |
| US10171483B1 (en) | 2013-08-23 | 2019-01-01 | Symantec Corporation | Utilizing endpoint asset awareness for network intrusion detection |
| US9860216B2 (en)* | 2013-09-16 | 2018-01-02 | Axis Ab | Anonymous decisions in an access control system |
| US9471798B2 (en) | 2013-09-20 | 2016-10-18 | Oracle International Corporation | Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm |
| KR101670496B1 (en)* | 2014-08-27 | 2016-10-28 | 주식회사 파수닷컴 | Data management method, Computer program for the same, Recording medium storing computer program for the same, and User Client for the same |
| US9298899B1 (en) | 2014-09-11 | 2016-03-29 | Bank Of America Corporation | Continuous monitoring of access of computing resources |
| US10171437B2 (en) | 2015-04-24 | 2019-01-01 | Oracle International Corporation | Techniques for security artifacts management |
| US10142371B2 (en) | 2015-04-24 | 2018-11-27 | Oracle International Corporation | Authorization policy customization and authorization policy lockdown |
| US10104086B2 (en) | 2015-04-24 | 2018-10-16 | Oracle International Corporation | Techniques for fine grained protection of resources in an access management environment |
| US9462013B1 (en) | 2015-04-29 | 2016-10-04 | International Business Machines Corporation | Managing security breaches in a networked computing environment |
| US9923908B2 (en) | 2015-04-29 | 2018-03-20 | International Business Machines Corporation | Data protection in a networked computing environment |
| US9954870B2 (en) | 2015-04-29 | 2018-04-24 | International Business Machines Corporation | System conversion in a networked computing environment |
| US9736259B2 (en)* | 2015-06-30 | 2017-08-15 | Iheartmedia Management Services, Inc. | Platform-as-a-service with proxy-controlled request routing |
| US10395042B2 (en) | 2015-07-02 | 2019-08-27 | Oracle International Corporation | Data encryption service |
| US10742681B2 (en)* | 2015-08-21 | 2020-08-11 | PushPull Technology Limited | Data collaboration |
| JP6655914B2 (en)* | 2015-09-02 | 2020-03-04 | インフォサイエンス株式会社 | Authority information management system and authority information management program |
| US10776520B2 (en)* | 2015-09-14 | 2020-09-15 | Northwestern University | System and method for proxy-based data access mechanism in enterprise mobility management |
| US10694352B2 (en) | 2015-10-28 | 2020-06-23 | Activision Publishing, Inc. | System and method of using physical objects to control software access |
| US10044764B2 (en)* | 2015-12-28 | 2018-08-07 | Quest Software Inc. | Context-aware delegation engine |
| US9888039B2 (en) | 2015-12-28 | 2018-02-06 | Palantir Technologies Inc. | Network-based permissioning system |
| US9674201B1 (en) | 2015-12-29 | 2017-06-06 | Imperva, Inc. | Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets |
| US9674202B1 (en) | 2015-12-29 | 2017-06-06 | Imperva, Inc. | Techniques for preventing large-scale data breaches utilizing differentiated protection layers |
| US10621225B2 (en) | 2016-01-19 | 2020-04-14 | Regwez, Inc. | Hierarchical visual faceted search engine |
| US20170208125A1 (en)* | 2016-01-19 | 2017-07-20 | Hope Bay Technologies, Inc | Method and apparatus for data prefetch in cloud based storage system |
| WO2017142970A1 (en)* | 2016-02-16 | 2017-08-24 | Illumio, Inc. | Enforcing label-based rules on a per-user basis in a distributed network management system |
| GB2555511A (en)* | 2016-06-30 | 2018-05-02 | Mtk Ip Ltd | Content management system |
| JP6772655B2 (en)* | 2016-08-15 | 2020-10-21 | 富士通株式会社 | Information processing system and information processing method |
| US10778650B2 (en)* | 2016-08-17 | 2020-09-15 | Dell Products L.P. | Systems and methods for management domain attestation service |
| US10289854B1 (en)* | 2016-09-23 | 2019-05-14 | Amdocs Development Limited | Apparatus, computer program, and method for generating an intermediate entitlement specification for controlling access to service or content |
| US10419488B2 (en) | 2017-03-03 | 2019-09-17 | Microsoft Technology Licensing, Llc | Delegating security policy management authority to managed accounts |
| US10511632B2 (en) | 2017-03-03 | 2019-12-17 | Microsoft Technology Licensing, Llc | Incremental security policy development for an enterprise network |
| US10467551B2 (en) | 2017-06-12 | 2019-11-05 | Ford Motor Company | Portable privacy management |
| US11032280B1 (en)* | 2017-12-13 | 2021-06-08 | Amazon Technologies, Inc. | Proxy for controlling access to services |
| US10785190B2 (en)* | 2017-12-13 | 2020-09-22 | Adaptiv Networks Inc. | System, apparatus and method for providing a unified firewall manager |
| US10872142B1 (en)* | 2018-03-02 | 2020-12-22 | Amazon Technologies, Inc. | Localized identity management in limited communication networks |
| US10979439B1 (en) | 2018-03-02 | 2021-04-13 | Amazon Technologies, Inc. | Identity management for coordinated devices in a networked environment |
| US10838710B2 (en) | 2018-05-15 | 2020-11-17 | International Business Machines Corporation | Dynamically updating security preferences in an Internet of Things (IoT) environment |
| US10158545B1 (en)* | 2018-05-31 | 2018-12-18 | Tempered Networks, Inc. | Monitoring overlay networks |
| US11636220B2 (en) | 2019-02-01 | 2023-04-25 | Intertrust Technologies Corporation | Data management systems and methods |
| JP2022535658A (en) | 2019-04-02 | 2022-08-10 | トライノミアル グローバル リミティド | Remote management of user devices |
| US11372995B2 (en) | 2020-01-17 | 2022-06-28 | Snowflake Inc. | Container-centric access control on database objects |
| US10911418B1 (en) | 2020-06-26 | 2021-02-02 | Tempered Networks, Inc. | Port level policy isolation in overlay networks |
| GB2598552B (en)* | 2020-08-25 | 2023-01-04 | Advanced Risc Mach Ltd | Network security |
| US11070594B1 (en) | 2020-10-16 | 2021-07-20 | Tempered Networks, Inc. | Applying overlay network policy based on users |
| US10999154B1 (en) | 2020-10-23 | 2021-05-04 | Tempered Networks, Inc. | Relay node management for overlay networks |
| US20230015697A1 (en)* | 2021-07-13 | 2023-01-19 | Citrix Systems, Inc. | Application programming interface (api) authorization |
| US11669527B1 (en)* | 2021-11-23 | 2023-06-06 | Sap Se | Optimized policy data structure for distributed authorization systems |
| CN114499922B (en)* | 2021-11-30 | 2024-08-16 | 中国大唐集团科学技术研究总院有限公司 | Intelligent zero trust dynamic authorization method |
| US11934543B1 (en) | 2022-11-17 | 2024-03-19 | Snowflake Inc. | Transient object references |
| WO2024220026A1 (en)* | 2023-04-21 | 2024-10-24 | Credit Suisse Ag | Application server and method for managing a set of computing resources |