$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Distributed security auditing subsystem for an operating system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G06F-015/16
  • G06F-013/00
출원번호 US-0542688 (1990-06-22)
발명자 / 주소
  • Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 335  인용 특허 : 9

초록

The distributed auditing subsystem invention runs in a UNIX-like operating system environment with a hierarchical file system. The invention provides an audit trail of accesses to the objects it protects and maintains and protects that audit trail from modification or unauthorized access or destruct

대표청구항

A distributed, security auditing subsystem for performing on-line auditing of events in each of a plurality of client processors in a system and performing on-line compression of an audit trail of said events in a server processor in the system, comprising: a first security audit daemon in a first c

이 특허에 인용된 특허 (9)

  1. Kovalcin David (Grafton MA), Console unit for clustered digital data processing system.
  2. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  3. Scullion Christopher K. (Bethlehem PA) Muschlitz Bruce A. (Bethlehem PA), Insertion machine with audit trail and command protocol.
  4. Naftzger Walter L. (Dallas TX) O\Banon Charles M. (Lewisville TX), Method for monitoring receipt and stocking of goods in a direct store delivery.
  5. Agrawal Rakesh (Chatham NJ) Ezzat Ahmed K. (New Providence NJ), Method of file access in a distributed processing computer network.
  6. Alsberg Peter (Urbana IL), Protector system for computer access and use.
  7. Berneking D. J. (Austin TX) Calmes P. M. (Austin TX) Wallace P. H. (Round Rock TX), Reconfigurable well logging system.
  8. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  9. Schmidt, Eric E.; Lampson, Butler W., Software version management system.

이 특허를 인용한 특허 (335)

  1. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  2. Stamos,Nicholas; Buccella,Donato; Carson,Dwayne A., Adaptive transparent encryption.
  3. Stamos,Nicholas; Buccella,Donato; Carson,Dwayne A., Adaptive transparent encryption.
  4. van der Made, Peter A. J., Analytical virtual machine.
  5. van der Made,Peter A. J., Analytical virtual machine.
  6. Lu James ; Juan Shao-Min ; Asava Anand, Apparatus and method for computer job workload distribution.
  7. Proudler,Graeme John; Balacheff,Boris; Plaquin,David, Apparatus and method for creating a trusted environment.
  8. Proudler,Graeme John; Balacheff,Boris; Worley,John S.; Hyser,Chris D.; Worley, Jr.,William S, Apparatus and method for creating a trusted environment.
  9. Lee, Kwang-Yong; Kim, Beob-Kyun, Apparatus and method for guaranteeing safe execution of shell command in embedded system.
  10. Asad, Khalid A.; Samuel, Subodh A., Apparatus and method for protecting against data tampering in an audit subsystem.
  11. Boyle John M. ; Maiwald Eric S. ; Snow David W., Apparatus and method for providing network security.
  12. Yarom Yuval,ILX, Apparatus for and method of providing user exits on an operating system platform.
  13. Yarom Yuval,ILX, Apparatus for and method of providing user exits on an operating system platform.
  14. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  15. Tran Trung M., Auditing login activity in a distributed computing environment.
  16. Carter, Earl T., Binary state machine system and method for REGEX processing of a data stream in an intrusion detection system.
  17. Bharathula, Madhu, Centralized audit and error handling.
  18. Klemba Keith S. ; Crall Christopher J. ; Palmer Thomas A. ; Pato Joseph N. ; Anderson Anne H. ; Carpenter Gregory P., Checkpoint object.
  19. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  20. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  21. Plum Thomas (Kamuela HI), Computer software licensing authentication method and apparatus.
  22. Coffee Steven R. ; Pinsley David B. ; Poloniewicz Karen A. ; Costello Stephen J. ; Stanziani Steven N., Computer use meter and analyzer.
  23. Coffey Steven R. (East Hampton NY) Pinsley David B. (Great Neck NY) Poloniewicz Karen A. (East Setauket NY), Computer use meter and analyzer.
  24. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  25. Crane Christina Heidi ; Philpot ; Jr. Edwin Michael ; Sirkin Stephna Jeanne ; Walker ; Jr. Kenneth, Configuration and unconfiguration of distributed computing environment components.
  26. Blumenau, Trevor, Content display monitor.
  27. Blumenau, Trevor, Content display monitor.
  28. Blumenau, Trevor, Content display monitor.
  29. Blumenau, Trevor, Content display monitor.
  30. Blumenau, Trevor, Content display monitor.
  31. Blumenau, Trevor, Content display monitor.
  32. Blumenau, Trevor, Content display monitor.
  33. Blumenau, Trevor, Content display monitor.
  34. Blumenau, Trevor, Content display monitor.
  35. Blumenau, Trevor, Content display monitor.
  36. Blumenau, Trevor, Content display monitor.
  37. Blumenau, Trevor, Content display monitor.
  38. Blumenau,Trevor, Content display monitoring by a processing system.
  39. Proudler,Graeme John; Balacheff,Boris; Pearson,Siani Lynne; Chan,David, Data event logging in computing platform.
  40. Proudler,Graeme John; Balacheff,Boris, Data integrity monitoring in trusted computing entity.
  41. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  42. de Vries, Jeffrey; Hitomi, Arthur S., Deriving component statistics for a stream enabled application.
  43. de Vries, Jeffrey; Hitomi, Arthur Shingen, Deriving component statistics for a stream enabled application.
  44. Morrow, James W.; McAllister, Lawrence; Dubner, Robert; Carman, David, Device verification system and method.
  45. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  46. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., Directory service for a computer network.
  47. Sipple, Ralph E.; Hill, Michael J.; Konrad, Dennis R., Disk recovery/reconstruction.
  48. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Distributed directory service using junction nodes for providing network users with an integrated hierarchical directory services.
  49. Ooe Kazuichi,JPX ; Inano Satosi,JPX, Distribution file system for accessing required portion of file.
  50. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  51. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  52. Robert E. Gleichauf ; Gerald S Lathem ; Scott V. Waddell, Domain mapping method and system.
  53. Sipple Ralph E. ; Cooper Thomas P. ; Konrad Dennis R. ; Heideman Michael J., Dual XPCS for disaster recovery.
  54. Heideman Michael J. ; Cooper Thomas P., Dual XPCS for disaster recovery in multi-host computer complexes.
  55. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  56. Tracy,Richard P.; Barrett,Hugh; Berman,Lon J.; Catlin,Gary M.; Dimtsios,Thomas G., Enhanced system, method and medium for certifying and accrediting requirements compliance.
  57. Tracy, Richard P.; Barrett, Hugh; Catlin, Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment.
  58. Tracy,Richard P.; Barrett,Hugh; Catlin,Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model.
  59. Schneier Bruce ; Kelsey John M., Event auditing system.
  60. David L. Drake ; David J. Webster, Event detection.
  61. Huntington, II, Jonathan T.; Bramley, Jr., Richard A., Extensible firmware interface virus scan.
  62. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
  63. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  64. Rossmann, Alain, Hybrid systems for securing digital assets.
  65. Kobayashi, Ayako; Kawaura, Hisanori, Image forming apparatus, program adding method, and a recording medium.
  66. Sakai,Keiichi, Image surveillance system processing user's voice request to provide access authority level of each client in the system.
  67. Hambrick Geoffrey Martin ; Rowan James Matthew, Implementation of teams and roles within a people oriented work environment.
  68. Ueda Toru (Ichihara JPX), Information retrieving apparatus.
  69. Day, Christopher; Gurkok, Cem, Information security auditing and incident investigation system.
  70. Proudler, Graeme John; Balacheff, Boris, Information system.
  71. Sima, Caleb; Millar, Steve; Kelly, Raymond; Sullivan, Bryan; Sullivan, Gerald; Tillery, David, Integrated crawling and auditing of web applications and web content.
  72. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  73. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  74. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  75. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  76. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  77. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  78. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  79. Shanklin, Steven D.; Bernhard, Thomas E.; Lathem, Gerald S., Intrusion detection signature analysis using regular expressions and logical operators.
  80. Steven D. Shanklin ; Thomas E. Bernhard ; Gerald S. Lathem, Intrusion detection signature analysis using regular expressions and logical operators.
  81. Teal, Daniel M., Intrusion detection system and method having dynamically loaded signatures.
  82. Chinta, Ramesh; Field, Scott A.; Zhu, Liqiang; Akkus, Umit; Bhai, Siddharth; Kannan, Gopinathan; Simmons, James J; Cao, Qi; Miller, Paul; Fairfax, Ryan; Hanganu, Alexandru, Isolation of services or processes using credential managed accounts.
  83. Tania Trinh Ly, Kerberos command structure and method for enabling specialized Kerbero service requests.
  84. Petersen, Chris; Villella, Phillip, Log collection, structuring and processing.
  85. Petersen, Chris; Villella, Phillip, Log collection, structuring and processing.
  86. Cabrera, Luis Felipe; Kusters, Norbert P.; Wieland, Peter W.; Rinne, Robert D., Logical volume mount manager.
  87. Cabrera,Luis Felipe; Kusters,Norbert P.; Wieland,Peter W.; Rinne,Robert D., Logical volume mount manager.
  88. Adya,Atul; Lorch,Jacob R.; Chaiken,Ronnie I; Bolosky,William J., Lossless recovery for computer systems with map assisted state transfer.
  89. Adya,Atul; Chaiken,Ronnie I.; Bolosky,William J., Lossless recovery for computer systems with remotely dependent data recovery.
  90. Stamos, Nicholas; Birnbaum, Seth N.; Revesz, Jr., Tomas; Buccella, Donato; MacDonald, Keith A.; Carson, Dwayne A.; Fletcher, William E., Managed distribution of digital assets.
  91. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  92. Blumenau Trevor, Metering of internet content using a control.
  93. Hammond, Nicolas J., Method and apparatus for auditing network security.
  94. Hammond,Nicolas J., Method and apparatus for auditing network security.
  95. Esbensen Daniel, Method and apparatus for automated network-wide surveillance and security breach intervention.
  96. Ault Donald Fred ; Bender Ernest Scott ; Spiegel Michael Gary, Method and apparatus for creating a security environment for a user task in a client/server system.
  97. Byers Larry L. ; Robeck Gary R. ; Brunmeier Terry J. ; DeGarmo Randy L. ; LaBerge Paul A., Method and apparatus for dynamically testing a memory within a computer system.
  98. Larsen,Vincent Alan, Method and apparatus for implementing process-based security in a computer system.
  99. Byers Larry L. (Apple Valley MN) Robeck Gary R. (Albertville MN) Brunmeier Terry J. (Shoreview MN) Miller John A. (Shoreview MN), Method and apparatus for isolating an error within a computer system that transfers data via an interface device.
  100. Byers Larry L. ; Robeck Gary R. ; Brunmeier Terry J., Method and apparatus for locally generating addressing information for a memory access.
  101. Prasad Ranjan (Sandy UT) Olds Dale R. (Sandy UT), Method and apparatus for moving subtrees in a distributed network directory.
  102. Prasad Ranjan ; Olds Dale Robert, Method and apparatus for moving subtrees in a distributed network directory.
  103. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  104. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  105. Cohen, Fred, Method and apparatus for network deception/emulation.
  106. Cohen,Fred, Method and apparatus for network deception/emulation.
  107. Carley William J. ; Lyon James M. ; McCline Matthew C. ; Skarpelos Michael J., Method and apparatus for preventing inadvertent changes to system-critical files in a computing system.
  108. Byers Larry L. ; Robeck Gary R. ; Splett Ronald W., Method and apparatus for providing fault detection to a bus within a computer system.
  109. Higley DeeAnne Barker ; Thorne Bruce Warner ; Jarvis Brian Lee, Method and apparatus for proxy authentication.
  110. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  111. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  112. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  113. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  114. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  115. Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
  116. Gleichauf, Robert E.; Teal, Daniel M.; Wiley, Kevin L., Method and system for adaptive network security using intelligent packet analysis.
  117. Robert E. Gleichauf ; Daniel M. Teal ; Kevin L. Wiley, Method and system for adaptive network security using intelligent packet analysis.
  118. Gleichauf Robert E. ; Randall William A. ; Teal Daniel M. ; Waddell Scott V. ; Ziese Kevin J., Method and system for adaptive network security using network vulnerability assessment.
  119. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  120. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  121. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  122. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  123. Zheng, Wenbin; Fan, Paul; Lu, Jianhua; Zhang, Xiaolin, Method and system for detecting behavior of remotely intruding into computer.
  124. Campbell, Wayne A.; Walker, Jeffrey H., Method and system for detecting intrusion into and misuse of a data processing system.
  125. Kevin J. Ziese, Method and system for dynamically distributing updates in a network.
  126. Ziese,Kevin J., Method and system for dynamically distributing updates in a network.
  127. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  128. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  129. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  130. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  131. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  132. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  133. Vainstein, Klimenty, Method and system for managing security tiers.
  134. Gleichauf, Robert E.; Lathem, Gerald; Waddell, Scott V., Method and system for mapping a network for system security.
  135. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  136. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  137. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  138. Nath, Satyajit, Method and system for providing document retention using cryptography.
  139. Nath, Satyajit, Method and system for providing document retention using cryptography.
  140. Ziese, Kevin J., Method and system for providing tamper-resistant executable software.
  141. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  142. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  143. Trevor Blumenau, Method and system for the discovery of cookies and other client information.
  144. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  145. Vainstein, Klimenty, Method and system for validating timestamps.
  146. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  147. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  148. Narayanan,Lakshmi, Method for controlled and audited access to privileged accounts on computer systems.
  149. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Method for downloading an icon corresponding to a hierarchical directory structure from a directory service.
  150. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  151. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  152. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  153. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  154. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  155. Sudama Ram (Hudson MA) Griffin David M. (Maynard MA) Johnson Brad (Westerly RI) Sealy Dexter (Boston MA) Shelhamer James (Maynard MA) Tallman Owen H. (Lunenburg MA), Method for providing a security facility for a network of management servers utilizing a database of trust relations to.
  156. Lotem, Amnon; Cohen, Gideon; Ben Naon, Lior, Method for simulation aided security event management.
  157. Claes, Heinz-Josef, Method for the protected deposit of event protocol data of a computer system, computer program product and computer system.
  158. Pearson, Siani Lynne; Proudler, Graeme John, Method of and apparatus for ascertaining the status of a data processing environment.
  159. Allard James E. ; Treadwell ; III David R. ; Ludeman John F., Method, system and apparatus for client-side usage tracking of information server systems.
  160. Donald, James Lawrence; Wright, David Howell, Methods and apparatus for metering computer-based media presentation.
  161. Alla, Madhusudhan Reddy; Burbank, John R., Methods and apparatus to collect distributed user information for media impressions.
  162. Splaine, Steven J.; Swift, Adrian, Methods and apparatus to collect distributed user information for media impressions.
  163. Bosworth, Alan N.; Alla, Madhusudhan Reddy; Splaine, Steven J.; Shivampet, Brahmanand Reddy; Gaynor, Kevin K., Methods and apparatus to collect distributed user information for media impressions and search terms.
  164. Bosworth, Alan N.; Alla, Madhusudhan Reddy; Splaine, Steven J.; Shivampet, Brahmanand Reddy; Gaynor, Kevin K., Methods and apparatus to collect distributed user information for media impressions and search terms.
  165. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  166. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  167. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  168. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  169. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  170. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  171. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  172. Heffernan, Ronan; Geraghty, Kevin; Kalus, Mark; Mazumdar, Mainak; Paparo, Ari; Splaine, Steven John, Methods and apparatus to determine impressions using distributed demographic information.
  173. Heffernan, Ronan; Geraghty, Kevin; Kalus, Mark; Mazumdar, Mainak; Paparo, Ari; Splaine, Steven John, Methods and apparatus to determine impressions using distributed demographic information.
  174. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  175. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  176. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  177. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  178. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  179. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  180. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  181. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  182. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  183. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  184. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  185. Ramaswamy, Arun; Bosworth, Alan N.; Gaynor, Kevin K.; Goli, Narasimha Reddy, Methods and apparatus to measure exposure to streaming media.
  186. Ramaswamy, Arun; Bosworth, Alan N.; Gaynor, Kevin K.; Narasimha, Goli Reddy, Methods and apparatus to measure exposure to streaming media.
  187. Hannan, Kevin Michael; Papakostas, Achilleas; Perez, Albert Ronald; Yonker, Michael Andrew; Albino, Austin William, Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles.
  188. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  189. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  190. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  191. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  192. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  193. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  194. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  195. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  196. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  197. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  198. Holden,James M.; Levin,Stephen E.; Nickel,James O.; Wrench,Edwin H., Methods of operating portable computerized device with network security.
  199. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  200. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  201. Sambamurthy, Govinda Raj; Rao, Hari Charan Ramachandra; Pasupuleti, Viswanath, Model for capturing audit trail data with reduced probability of loss of critical data.
  202. Jain, Anand; Stavropoulos, John; Neuhauser, Alan; Lynch, Wendell; Kuznetsov, Vladimir; Crystal, Jack, Monitoring media exposure using wireless communications.
  203. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  204. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  205. Baker, Stephen M., Multilayered intrusion detection system and method.
  206. Griffin, Jonathan; Dalton, Christopher I.; Child, Michael; Chen, Liqun; Norman, Andrew Patrick, Multiple trusted computing environments.
  207. Griffin,Jonathan; Chen,Liqun, Multiple trusted computing environments with verifiable environment identities.
  208. Bernhard, Thomas E.; Shanklin, Steven D.; Lathem, Gerald S., Network intrusion detection signature analysis using decision graphs.
  209. Milan V. Trcka ; Kenneth T. Fallon ; Mark R. Jones ; Ronald W. Walker, Network security and surveillance system.
  210. Terada Masato,JPX ; Yoshida Kenichi,JPX ; Kayashima Makoto,JPX, Network system having external/internal audit system for computer security.
  211. Proudler,Graeme John; Chan,David, Operation of trusted state in computing platform.
  212. DeVries, Jeffrey; Hitomi, Arthur, Opportunistic block transmission with time constraints.
  213. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  214. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  215. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  216. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  217. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  218. Holler, Anne Marie; Shah, Lacky Vasant; Panwar, Sameer; Patel, Amit, Optimized server for streamed applications.
  219. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  220. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  221. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  222. Proudler, Graeme John, Performance of a service on a computing platform.
  223. Griffin,Jonathan; Dalton,Christopher I., Performing secure and insecure computing operations in a compartmented operating system.
  224. Luis Felipe Cabrera ; Norbert P. Kusters, Persistent names for logical volumes.
  225. Cabrera Luis Felipe ; Kusters Norbert P., Persistent volume mount points.
  226. Wu Tajen R. ; Shannon William A. ; Fronberg Paul ; Stephenson Donald R. ; Samar Vipin, Pluggable account management interface with unified login and logout and multiple user authentication services.
  227. White John W., Portable and dynamic distributed transaction management method.
  228. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  229. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  230. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  231. Olds Dale R. ; Izatt Layne ; Prasad Ranjan, Replicated object identification in a partitioned hierarchy.
  232. Neeman Yuval (Bellevue WA) Cook Peter (Redmond WA) Miller Arnold S. (Bellevue WA) Raman Balan (Redmond WA), Replication facility.
  233. Raman Balan S. ; Miller Arnold S. ; Straube Dave D. ; Shen Shioupyn, Replication optimization system and method.
  234. Devarakonda Murthy V. (Ossining NY) Kish William A. (Millerton NY), Scheme to determine completion of directory operations for server recovery.
  235. Henry R. Tumblin ; Michael S. Rothman ; Fred J. Pinkett ; James M. Geary ; Steve R. Artick, Seamless integration of application programs with security key infrastructure.
  236. Meyers William J. ; Fraioli Marc J. ; Spencer Jon F., Secure computer system.
  237. Oltmans, James Robert; Zweber, Benjamin E., Secure data storage.
  238. Oltmans, James Robert; Zweber, Benjamin E., Secure data storage.
  239. Aissi, Selim, Secured and selective runtime auditing services using a trusted computing device.
  240. Garcia,Denis Jacques Paul, Secured data format for access control.
  241. Gore ; Jr. Robert Cecil ; Haugh ; II John Frederick, Secured gateway interface.
  242. Deo Umesh, Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems.
  243. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  244. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  245. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  246. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  247. Vinson, Jeffrey; Westerberg, Steig G.; Vries, Jeffrey De, Software streaming system and method.
  248. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  249. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  250. van den Oever, Laurens; Dent, Jason Matthew, Statistical linguistic analysis of source content.
  251. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  252. Heiserman Tammy A. (Ft. Collins CO) Adams Aland B. (Ft. Collins CO), System administration module for an operating system affords graded restricted access privileges.
  253. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  254. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  255. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  256. Harrison, Clifford A.; Weber, Emery J.; Bush, Phillip M., System and method for computer-aided technician dispatch and communication.
  257. Harrison,Clifford A.; Weber,Emery J.; Bush,Phillip M., System and method for computer-aided technician dispatch and communication.
  258. Beakley, Jonathan G., System and method for consolidating and sorting event data.
  259. Lauckhart, Gregory J.; Horman, Craig B.; Korol, Christa; Bartot, James T., System and method for estimating prevalence of digital content on the world-wide-web.
  260. Lauckhart, Gregory J.; Horman, Craig B.; Korol, Christa; Bartot, James T., System and method for estimating prevalence of digital content on the world-wide-web.
  261. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for generating fictitious content for a computer.
  262. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  263. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  264. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  265. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  266. Nagai, Shingo; Takahashi, Nobuaki; Ohsawa, Fumitomo, System and method for managing root file system.
  267. Johnson Charles George ; Lakshmi-Ratan Ramnath A. ; Lanning Steven G. ; Renger Bernard S L, System and method for monitoring information flow and performing data collection.
  268. Johnson Charles George ; Renger Bernard S L, System and method for monitoring information flow and performing data collection.
  269. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for preventing detection of a selected process running on a computer.
  270. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  271. Verma,Ravi, System and method for preventing software piracy.
  272. Daniell,William T.; Daigle,Brian K.; Sevounts,Gary, System and method for protecting a security profile of a computer system.
  273. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  274. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  275. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  276. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  277. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  278. Krantz David R., System and method for providing object authorization in a distributed computed network.
  279. Gilhuly, Barry J.; Van, Ngoc Anh; Rahn, Steven M.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information between a host system and a mobile data communication device.
  280. Mousseau, Gary P; Ferguson, Tabitha; Linkert, Barry; Vander Veen, Raymond; Castell, William D.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device.
  281. Mousseau,Gary P.; Ferguson,Tabitha K.; Linkert,Barry; Vander Veen,Raymond P.; Castell,William D.; Lazaridis,Mihal, System and method for pushing information from a host system to a mobile data communication device.
  282. Gleichauf Robert ; Shanklin Steven, System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment.
  283. Daniell,William T.; Daigle,Brian K.; Sevounts,Gary; Frank,Mitchell R., System and method for recovering a security profile of a computer system.
  284. Mousseau,Gary P.; Lazaridis,Mihal, System and method for redirecting message attachments between a host system and a mobile data communication device.
  285. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  286. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  287. Gleichauf Robert ; Shanklin Steven ; Waddell Scott ; Ziese Kevin, System and method for rules-driven multi-phase network vulnerability assessment.
  288. Sima, Caleb, System and method for testing web applications with recursive discovery and analysis.
  289. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  290. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  291. Moran,Douglas B., System and method for using login correlations to detect intrusions.
  292. Moran, Douglas B., System and method for using timestamps to detect attacks.
  293. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  294. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  295. Lachelt David Jonathan ; Houck Peter Thomas, System for logging and enabling ordered retrieval of management events.
  296. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  297. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  298. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., System for providing users an integrated directory service containing content nodes located in different groups of application servers in computer network.
  299. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., System for providing users with a filtered view of interactive network directory obtains from remote properties cache that provided by an on-line service.
  300. Kahn Robert E. ; Ely David K., System for uniquely and persistently identifying, managing, and tracking digital objects.
  301. Johnson, R. Brent, System to audit, monitor and control access to computers.
  302. Tracy,Richard P.; Barrett,Hugh; Berman,Lon J.; Catlin,Gary M., System, method and medium for certifying and accrediting requirements compliance.
  303. Kolessar, Ronald S.; Jensen, James M.; Lynch, Wendell D., Systems and methods for gathering audience measurement data.
  304. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  305. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  306. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  307. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  308. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  309. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  310. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  311. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  312. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  313. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  314. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  315. Trese, Andrew; Closset, Frank, Systems, methods, and media for generating analytical data.
  316. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  317. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  318. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  319. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  320. Brown,Richard; Pearson,Siani Lynne; Dalton,Christopher I., Trusted computing environment.
  321. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  322. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  323. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  324. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  325. Dave D. Straube ; Aaron M. Contorer ; Arnold S. Miller ; Balan S. Raman ; Pradyumna K. Misra ; Michael R. C. Seaman, Urgent replication facility.
  326. Straube, Dave D.; Contorer, Aaron M.; Miller, Arnold S.; Raman, Balan S.; Misra, Pradyumna K.; Seaman, Michael R. C., Urgent replication facility.
  327. Straube,Dave D.; Contorer,Aaron M.; Miller,Arnold S.; Raman,Balan S.; Misra,Pradyumna K.; Seaman,Michael R. C., Urgent replication facility.
  328. Straube,Dave D.; Contorer,Aaron M.; Miller,Arnold S.; Raman,Balan S.; Misra,Pradyumna K.; Seaman,Michael R. C., Urgent replication facility.
  329. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  330. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  331. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  332. Cabrera, Luis Felipe; van Ingen, Catharine; Kusters, Norbert P.; Gamache, Rod N., Volume configuration data administration.
  333. Cabrera,Luis Felipe; van Ingen,Catharine; Kusters,Norbert P., Volume migration.
  334. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  335. Trese, Andrew; Closset, Frank; van den Oever, Laurens, Web interface including the review and manipulation of a web document and utilizing permission based control.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로