$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Information handling system, method, and article of manufacture for efficient object security processing by grouping obj 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0582270 (1996-01-03)
발명자 / 주소
  • Benantar Messaoud
  • Blakley
  • III George Robert
  • Nadalin Anthony Joseph
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Jenkins & GilchristWalker
인용정보 피인용 횟수 : 227  인용 특허 : 0

초록

A system, method and article of manufacture, for improving object security in an object oriented system, includes one or more processors, a memory system, one or more I/O controllers, each controlling one or more I/O devices, a bus connecting the processors, the memory system and the I/O controllers

대표청구항

[ What is claimed is:] [1.] An information handling system, comprising:one or more processors;a memory system;one or more I/O controllers, each controlling one or more I/O devices;a bus connecting the processors, the memory system and the I/O controllers;an operating system controlling operation of

이 특허를 인용한 특허 (227)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Alan Tsu-I Yaung ; Jy-Jine James Lin, Access control system for a multimedia datastore.
  3. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  4. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  5. Sharma, Rosen; Bhargava, Rishi; Vittal, Chiradeep; Eranky, Shyam, Application change control.
  6. Kilday, Roger W.; Farooq, Aamir, Application-supervised access to managed content.
  7. Johnson,Richard C., Architecture for computer-implemented authentication and authorization.
  8. Lucovsky,Mark; Pierce,Shaun D.; Burner,Michael G.; Ward,Richard B.; Leach,Paul J.; Moore,George M.; Zwiegincew,Arthur; Hyman,Robert M.; Pincus,Jonathan D.; Simon,Daniel R., Authorizing a requesting entity to operate upon data structures.
  9. Shively, II, Darrell Myers; Knight, John; Patil, Kavita Shekhar; Boyd, Pauline Chen; Bui, Sonny; Roden, Thomas Anthony, Automatic hardware failure detection and recovery for distributed max sessions server.
  10. Shively, II,Darrell Myers; Knight,John; Patil,Kavita Shekhar; Boyd,Pauline Chen; Bui,Sonny; Roden,Thomas Anthony, Automatic hardware failure detection and recovery for distributed max sessions server.
  11. Panthaki, Behram; Rudenstine, Aaron; Sokolic, Jeremy; Sunderji, Amir; Dheer, Sanjeev; Platt, Neil; Papademetriou, Demetris, Centralized payment method and system for online and offline transactions.
  12. Cornils Curtis Lee, Channel isolation arrangement and method for dissociated data.
  13. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  14. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  15. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  16. Sato, Takashi; Kanetsuna, Katsuyuki; Toriyama, Mitsuru; Kijima, Kaoru, Communication system, communication apparatus, communication method, storage medium, and package medium.
  17. Dheer, Sanjeev; Sokolic, Jeremy N., Compliance monitoring method and apparatus.
  18. Wahlert, Brian M.; Jazayeri, Mike; van Ingen, Catharine; Berkowitz, Brian T.; Chandhok, Nikhil Vijay; Rangegowda, Dharshan; Badami, Vinay; Lashkari, Yezdi Z.; Fries, Robert M.; Harikrishnan, Seetharaman, Configuring a data protection system.
  19. Wahlert, Brian M.; Jazayeri, Mike; van Ingen, Catharine; Berkowitz, Brian T.; Chandhok, Nikhil Vijay; Rangegowda, Dharshan; Badami, Vinay; Lashkari, Yezdi Z.; Fries, Robert M.; Harikrishnan, Seetharaman, Configuring a data protection system.
  20. Wahlert, Brian M.; Jazayeri, Mike; van Ingen, Catharine; Berkowitz, Brian T.; Chandhok, Nikhil Vijay; Rangegowda, Dharshan; Harikrishnan, Seetharaman; Badami, Vinay; Lashkari, Yezdi Z.; Fries, Robert M., Configuring a data protection system.
  21. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  22. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  23. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  24. O'Hare,Jeremy J.; Kanapathi,Sashe K., Controlling access to a storage device.
  25. Smith, Wayne E.; Downing, Alan Robert, Data replication security.
  26. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  27. David S. Schneider ; Michael B. Ribet ; Laurence R. Lipstone ; Daniel Jensen, Distributed administration of access to information.
  28. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  29. Friedel,Guy; Katz,Ariel; Nathan,Abraham; Shamir,Yaron, Distributed policy model for access control.
  30. Friedel,Guy; Katz,Ariel; Shamir,Yaron; Nathan,Abraham, Distributed policy model for access control.
  31. Lai, William Y.; Kalki, Jagadeesh, Distributing notifications to multiple recipients via a broadcast list.
  32. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  33. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  34. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  35. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  36. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  37. Elvanoglu, Ferhan; Pierce, Shaun D., Executing dynamically assigned functions while providing services.
  38. Elvanoglu, Ferhan; Pierce, Shaun D., Executing dynamically assigned functions while providing services.
  39. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  40. Clifford P. Van Dyke ; Peter T. Brundrett ; Michael M. Swift ; Praerit Garg ; Richard B. Ward, Extensible security system and method for controlling access to objects in a computing environment.
  41. Bowman, Mark Edward; Harris, Mark T.; Lewter, Sherry Pleasant; Kell, John Alexander, Facilitating presentation of content relating to a financial transaction.
  42. Bowman, Mark Edward; Harris, Mark T.; Sondergaard, Sherry Pleasant; Kell, John Alexander, Facilitating presentation of content relating to a financial transaction.
  43. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  44. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  45. Chang, David Yu; Venkataramappa, Vishwanath; Williamson, Leigh Allen, Fine-grained authorization by authorization table associated with a resource.
  46. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  47. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  48. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  49. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  50. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  51. Alles, David; Moore, George M., Identity-based distributed computing for device resources.
  52. Barkley John ; Cincotta Anthony V., Implementation of role/group permission association using object access type.
  53. Kight, Peter; Ganesan, Ravi; Lewis, Matt; Hobday, Jr., D. Kenneth; Dreyer, Hans Daniel, Inter-network electronic billing.
  54. Kight, Peter; Ganesan, Ravi; Lewis, Matthew Sheridan; Hobday, Jr., Donald Kenneth; Dreyer, Hans Daniel, Inter-network financial service.
  55. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  56. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  57. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  58. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  59. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  60. Black, Robert Barth, Method and aparatus for presence based resource management.
  61. Dilip, Venkatachari; Dheer, Sanjeev, Method and apparatus for analyzing financial data.
  62. Smith, Michael R, Method and apparatus for best effort propagation of security group information.
  63. Smith, Michael R., Method and apparatus for best effort propagation of security group information.
  64. Smith, Michael R., Method and apparatus for best effort propagation of security group information.
  65. Smith, Michael R., Method and apparatus for best effort propagation of security group information.
  66. Kay, James, Method and apparatus for electronic mail filtering.
  67. Kay, James, Method and apparatus for electronic mail filtering.
  68. Kay, James, Method and apparatus for electronic mail filtering.
  69. Dilip,Venkatachari; Dheer,Sanjeev, Method and apparatus for implementing financial transactions.
  70. Dilip,Venkatachari; Dheer,Sanjeev, Method and apparatus for implementing financial transactions.
  71. Dilip,Venkatachari; Dheer,Sanjeev, Method and apparatus for implementing financial transactions.
  72. Smith, Michael R., Method and apparatus for ingress filtering using security group information.
  73. Smith, Michael R., Method and apparatus for ingress filtering using security group information.
  74. Dilip,Venkatachari; Dhcer,Sanjeev, Method and apparatus for managing multiple accounts.
  75. Dilip, Venkatachari; Dheer, Sanjeev; Sunderji, Amir; Singh, Param, Method and apparatus for managing transactions.
  76. Dilip, Venkatachari; Dheer, Sanjeev; Sunderji, Amir; Singh, Param, Method and apparatus for managing transactions.
  77. Dilip, Venkatachari; Dheer, Sanjeev; Sunderji, Amir; Singh, Param, Method and apparatus for managing transactions.
  78. Dilip, Venkatachari; Dheer, Sanjeev; Sunderji, Amir; Singh, Param, Method and apparatus for managing transactions.
  79. Black, Robert Barth, Method and apparatus for presence based resource management.
  80. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  81. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  82. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  83. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  84. Carl Phillip Gusler ; Rick A. Hamilton, II ; Maulin Ishwarbhai Patel, Method and apparatus for processing recursive hard links in a data processing system.
  85. Smith, Michael R., Method and apparatus for providing network security using role-based access control.
  86. Smith, Michael R., Method and apparatus for providing network security using role-based access control.
  87. Smith, Michael R., Method and apparatus for providing network security using role-based access control.
  88. Smith, Michael R., Method and apparatus for providing network security using role-based access control.
  89. Smith, Michael R., Method and apparatus for providing network security using security labeling.
  90. Smith, Michael R., Method and apparatus for providing network security using security labeling.
  91. Blumenau, Steven M.; Hackett, Christopher; Derrico, Matthew, Method and apparatus for providing secure access to a computer system resource.
  92. Blumenau,Steven M.; Hackett,Christopher J.; D'Errico,Matthew J., Method and apparatus for providing secure access to a computer system resource.
  93. Blumenau,Steven M; Hackett,Christopher J.; D'Errico,Matthew J., Method and apparatus for providing secure access to a computer system resource.
  94. Steven M. Blumenau ; Christopher J. Hackett ; Matthew J. D'Errico, Method and apparatus for providing secure access to a computer system resource.
  95. Chen,Shigang; Bhattacharya,Partha; Wei,Liman, Method and apparatus for removing redundancies from a list of data structures.
  96. Messing, Roy; Sokolic, Jeremy N.; Dheer, Sanjeev; Dilip, Venkatachari, Method and apparatus for retrieving and processing data.
  97. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  98. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  99. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  100. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  101. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  102. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  103. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  104. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  105. Smith, Michael R., Method and system for generating user group identifiers.
  106. Smith, Michael R., Method and system for generating user group permission lists.
  107. Finn, Norman W.; Smith, Michael R., Method and system for including network security information in a frame.
  108. Finn, Norman W.; Smith, Michael R., Method and system for including network security information in a frame.
  109. Finn, Norman W.; Smith, Michael R., Method and system for including network security information in a frame.
  110. Smith, Michael R.; Nallur, Padmanabha; Kok, Wilson; Fine, Michael, Method and system for including security information with a packet.
  111. Smith, Michael R.; Nallur, Padmanabha; Kok, Wilson; Fine, Michael, Method and system for including security information with a packet.
  112. Smith, Michael R.; Nallur, Padmanabha; Kok, Wilson; Fine, Michael, Method and system for including security information with a packet.
  113. Mohinder, Preet, Method and system for providing user space address protection from writable memory area in a virtual environment.
  114. Smith, Michael R.; Nemat, Awais B.; Fine, Michael, Method and system for the assignment of security group information using a proxy.
  115. Smith, Michael R.; Nemat, Awais B.; Fine, Michael, Method and system for the assignment of security group information using a proxy.
  116. Gupta,Arun Kumar, Method for controlling access to information.
  117. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  118. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  119. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  120. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  121. Thuringer, John Neil; Jones, Simon; Bristow, Neil; Razdan, Ram; Sajja, Himavantha Rao, Method of partitioning a database.
  122. Zizys, Giedrius; Patiejunas, Kestutis, Method, system, and apparatus for providing resilient data transfer in a data protection system.
  123. Zizys, Giedrius; Patiejunas, Kestutis, Method, system, and apparatus for providing resilient data transfer in a data protection system.
  124. Zizys, Giedrius; Patiejunas, Kestutis, Method, system, and apparatus for providing resilient data transfer in a data protection system.
  125. Chan, Gary Dennis; Hansen, Lynda A.; Hsing, Chi-Pei Michael, Method, system, program and data structure for controlling access to sensitive functions.
  126. Rygaard,Christopher A., Mobile application access control list security system.
  127. Sokolic, Jeremy N.; Dheer, Sanjeev; Dilip, Venkatachari, Multiple trust modes for handling data.
  128. Sokolic,Jeremy N.; Dheer,Sanjeev; Dilip,Venkatachari, Multiple trust modes for handling data.
  129. Chevillat, Jérôme, Network resource access using social networks.
  130. Garg, Praerit; Swift, Michael M.; Van Dyke, Clifford P.; Ward, Richard B.; Brundrett, Peter T., Object type specific access control.
  131. Alan Tsu-I Yaung ; Jy-Jine James Lin, Object-oriented framework for managing access control in a multimedia database.
  132. Luckenbaugh Gary L., Object-oriented trusted application framework.
  133. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  134. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  135. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  136. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  137. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  138. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  139. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  140. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  141. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  142. Wollrath, Ann M.; Jones, Peter C.; Waldo, James H.; Scheifler, Robert W., Remote object activation in a distributed system.
  143. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  144. Demers,Alan J.; Elsbernd,Curtis; Stamos,James William; Wong,Lik, Schema evolution in replication.
  145. Lucovsky, Mark H.; Pierce, Shaun D.; Horvitz, Eric J., Schema-based context service.
  146. Lucas, John Michael; Webb, Arthur; Nixon, Mark J.; Jundt, Larry Oscar; Li, Jian; Stevenson, Dennis L.; Ott, Michael George; Koska, Herschel O.; Havekost, Robert Burke, Security for objects in a process plant configuration system.
  147. Himmel, Maria A.; Rodriguez, Herman; Newton, Jr., James S.; Spinac, Clifford J., Security objects controlling access to resources.
  148. Himmel,Maria Azua; Rodriguez,Herman; Smith, Jr.,Newton James; Spinac,Clifford Jay, Security objects controlling access to resources.
  149. Sebes, E. John; Vaishnav, Jay, Software modification by group to minimize breakage.
  150. Colburn Alex ; Drucker Steven M. ; Marple Kirk J. ; Mitchell Don P. ; Vellon Manny, Software object security mechanism.
  151. Sebes, E. John, Solidifying the executable software set of a computer.
  152. Sebes, E. John, Solidifying the executable software set of a computer.
  153. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  154. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  155. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  156. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  157. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  158. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  159. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  160. Godwin Debbie A. ; Hansen Kathryn I., System and method for automatically managing computing resources in a distributed computing environment.
  161. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  162. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  163. Colin Scott Dawson ; Michael Allen Kaczmarski ; Donald Paul Warren, Jr., System and method for command routing and execution in a multiprocessing system.
  164. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  165. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  166. Belani, Eshwar; Katiyar, Dinesh; Garg, Suneet, System and method for controlling access to resources in a distributed environment.
  167. Belani, Eshwar; Katiyar, Dinesh; Garg, Suneet, System and method for controlling access to resources in a distributed environment.
  168. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  169. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  170. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  171. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  172. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  173. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  174. Dennis, Michael W.; Freed, Michele L.; Plastina, Daniel; Flo, Eric R.; Kays, Jr., David E.; Corrington, Robert E., System and method for implementing group policy.
  175. Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
  176. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  177. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  178. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  179. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  180. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  181. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  182. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  183. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  184. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  185. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  186. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  187. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  188. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  189. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  190. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  191. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  192. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  193. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  194. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  195. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  196. Haugh, Julianne Frances, System and method for representing multiple security groups as a single data object.
  197. Haugh,Julianne Frances, System and method for representing multiple security groups as a single data object.
  198. Beedubail, Ganesha; Choy, David Mun-Hien; Hsiao, Hui-I; Raghavan, Sriram; Vaideeswaran, Ganesh, System and method for role based access control in a content management system.
  199. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  200. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  201. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  202. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  203. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  204. Hubbard, Dan, System and method of controlling access to the internet.
  205. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  206. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  207. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  208. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  209. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  210. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  211. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  212. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  213. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  214. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  215. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  216. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  217. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  218. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  219. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  220. Thuringer, John Neil; Jones, Simon; Bristow, Neil; Razdan, Ram; Sajja, Himavantha Rao, Systems, methods, and machine-readable memories for partitioning a database.
  221. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  222. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  223. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  224. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  225. Gong Li, Typed, parameterized, and extensible access control permissions.
  226. Adler, Steven B.; Brown, Nigel Howard Julian; Gilbert, Arthur M.; Palmer, Charles Campbell; Schnyder, Michael; Waidner, Michael, Using a privacy agreement framework to improve handling of personally identifiable information.
  227. Adler, Steven B.; Bangerter, Endre Felix; Bohrer, Kathryn Ann; Brown, Nigel Howard Julian; Camenisch, Jan; Gilbert, Arthur M.; Kesdogan, Dogan; Leonard, Matthew P.; Liu, Xuan; McCullough, Michael Robert; Nelson, Adam Charles; Palmer, Charles Campbell; Powers, Calvin Stacy; Schnyder, Michael; Schonberg, Edith; Schunter, Matthias; Van Herreweghen, Elsie; Waidner, Michael, Using an object model to improve handling of personally identifiable information.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로