$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Entitlement management and access control system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0288321 (1999-04-08)
발명자 / 주소
  • Feldman Daniel J.
대리인 / 주소
    Nutter, McClennen & Fish, LLP
인용정보 피인용 횟수 : 160  인용 특허 : 11

초록

The invention provides a method, system, and computer program product for determining accessor entitlement to a resource in response to an accessor request for access to the resource. The invention associates a resource with an entitlement expression that includes a reference to at least one members

대표청구항

[ What is claimed is:] [1.] In a system having a plurality of accessors and at least one resource, a method for determining accessor entitlement to a resource in response to an accessor request for access to the resource, comprising the steps of:a) associating with the resource an entitlement expres

이 특허에 인용된 특허 (11)

  1. Hunnicutt Heath ; Ludeman John F., Access check system utilizing cached access permissions.
  2. Waisman Amnon (Nashua NH) Weiss Andrew M. (Paramus NJ), B-tree structured data base using sparse array bit maps to store inverted lists.
  3. Roy Shaibal (Oakland CA), Database system with improved methods for B-tree maintenance.
  4. Schneider Peter (San Ramon CA), Database system with subquery optimizer.
  5. Angal Rajeev ; Allavarpu Sai V.S. ; Bhat Shivaram ; Fisher Bart Lee, Distributed system and method for controlling access to network resources and event notifications.
  6. Douglas Jeffrey G., Management of client requests in a client-server environment.
  7. Curley John L. (North Andover MA) Hirsch Thomas S. (Bedford MA) Stonier James W. (Tewksbury MA) Yu Kin C. (Burlington MA), Mechanism for enabling emulation system users to directly invoke a number of host system facilities for executing host p.
  8. French Clark (Pepperell MA) White Peter W. (Andover MA), Method and apparatus for indexing database columns with bit vectors.
  9. Chan Chuck Y. ; Ganugapati Krishna ; Johnson Margaret K. ; Judd Steven G. ; Kwan Stuart L. S. ; Watson Colin, Method and system for uniformly accessing multiple directory services.
  10. Pereira J. L. A., System and method for controlling access to personal computer system resources.
  11. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for database access control.

이 특허를 인용한 특허 (160)

  1. Baby, Thomas; Chandrasekar, Sivasankaran; Tarachandani, Asha; Agarwal, Nipun, Accelerating value-based lookup of XML document in XQuery.
  2. Stephenson, John W.; Chusing, Trevett B., Access control and entitlement determination for hierarchically organized content.
  3. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  4. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  5. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  6. Baschy, Leo M, Access-control-discontinuous hyperlink handling system and methods.
  7. Exton, Scott Anthony; Powell, Michael; Turner, Brian James, Authorization model for administration.
  8. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  9. Frazier, Timothy M., Automated system for messaging based on chains of relationships.
  10. Bate,Lyle; Carter,Stephen R.; Nevarez,Carlos A., Caching and accessing rights in a distributed computing system.
  11. Enokida, Tsutomu, Compiler device and computer-readable recording medium with a compiler recorded therein.
  12. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Conditional security response using taint vector monitoring.
  13. Reasons,John D.; Vineyard,James L., Connected support entitlement system and method of operation.
  14. Reasons,John D.; Vineyard,James L., Connected support entitlement system method of operation.
  15. Farzin Dadsetan DK; Tom Claus Goldermann Thuneby DK, Controlling device access in a network.
  16. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Data handling apparatus adapted for scheduling operations according to resource allocation based on entitlement.
  17. Brookler, David E.; Hazi, Ariel; Sullivan, Dave L.; Tham, Dominic; Tinari, Philip A.; Weinberg, Paul N., Data indexing using bit vectors.
  18. Umbreit, Timothy F., Date of birth authentication system and method using demographic and/or geographic data supplied by a subscriber that is verified by a third party.
  19. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Delegated administration for a distributed security system.
  20. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  21. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  22. Rajasekaran, Sanguthevar; Gopalakrishna, Rajendra A., Efficient computational techniques for authorization control.
  23. Ge, Fei; Idicula, Sam; Jain, Namit; Agarwal, Nipun, Efficient processing of path related operations on data organized hierarchically in an RDBMS.
  24. Idicula, Sam; Baby, Thomas; Agarwal, Nipun; Sedlar, Eric, Efficient queriability of version histories in a repository.
  25. Idicula, Sam; Chandrasekar, Sivasankaran; Agarwal, Nipun, Efficient streaming evaluation of XPaths on binary-encoded XML schema-based documents.
  26. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Casey T., Encrypted memory.
  27. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority.
  28. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority.
  29. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Entitlement vector for managing resource allocation.
  30. Chandrasekar, Sivasankaran; Zhang, Ning; Idicula, Sam; Agarwal, Nipun, Fast extraction of scalar values from binary encoded XML.
  31. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Fine-grained security in federated data sets.
  32. Agrawal,Abhyudaya; Murthy,Ravi; Chandrasekar,Sivasankaran; Agarwal,Nipun; Sedlar,Eric, Flexible handling of datetime XML datatype in a database system.
  33. Agrawal, Abhyudaya; Chandrasekar, Sivasankaran; Murthy, Ravi; Agarwal, Nipun; Sedlar, Eric, Flexible storage of XML collections within an object-relational database.
  34. Agrawal, Abhyudaya; Chandrasekar, Sivasankaran; Murthy, Ravi; Agarwal, Nipun; Sedlar, Eric, Flexible storage of XML collections within an object-relational database.
  35. Roy, Indroniel Deb; Yoshida, Shinji, Generating XML instances from flat files.
  36. Jain,Namit; Agarwal,Nipun; Murthy,Ravi, Generating a schema-specific load structure to load data into a relational database based on determining whether the schema-specific load structure already exists.
  37. Dominic, Pushparani M., Generic security infrastructure for COM based systems.
  38. Baby, Thomas; Zhang, Ning; Chandrasekar, Sivasankaran; Agarwal, Nipun; Tarachandani, Asha, Global query normalization to improve XML index based rewrites for path subsetted index.
  39. Cheriton, David R., Hierarchical associative memory-based classification system.
  40. Villavicencio, Francisco J., Impersonation in an access system.
  41. Villavicencio,Francisco J., Impersonation in an access system.
  42. Murthy,Ravi; Chandrasekaran,Sivasankaran; Thusoo,Ashish; Agarwal,Nipun; Sedlar,Eric, Index maintenance for operations involving indexed XML data.
  43. Krishnamurthy, Sanjay M., Indexing XML documents efficiently.
  44. Agarwal,Nipun; Sedlar,Eric; Murthy,Ravi, Indexing to efficiently manage versioned data in a database system.
  45. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Instruction set adapted for security risk monitoring.
  46. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Intrusion detection using taint accumulation.
  47. Hodges, Jeffrey D., Intrusion threat detection.
  48. Tarachandani, Asha; Chandrasekar, Sivasankaran; Tam, Man-Hay; Tran, Anh-Tuan; Murthy, Ravi; Agarwal, Nipun; Sedlar, Eric, Isolation for applications working on shared XML data.
  49. Tarachandani, Asha; Chandrasekar, Sivasankaran; Tam, Man-Hay; Tran, Anh-Tuan; Murthy, Ravi; Agarwal, Nipun; Sedlar, Eric, Isolation for applications working on shared XML data.
  50. Pannala,Syam; Sedlar,Eric; Khaladkar,Bhushan; Murthy,Ravi; Chandrasekar,Sivasankaran; Agarwal,Nipun, Loadable units for lazy manifestation of XML documents.
  51. Ramamurthy,Srinivasagopalan; Teng,Joan C., Localized access.
  52. Joshi, Vrinda S.; Ramamurthy, Srinivasagapala, Logging access system events.
  53. Agrawal, Abhyudaya; Murthy, Ravi; Agarwal, Nipun; Chandrasekar, Sivasankaran; Sedlar, Eric, Managing cyclic constructs of XML schema in a rdbms.
  54. Illg, Jason J.; Murray, Sean; Pisello, John M., Matching entitlement information for multiple sources.
  55. Tarachandani, Asha; Chandrasekar, Sivasankaran; Agarwal, Nipun; Sedlar, Eric; Murthy, Ravi; Tran, Anh-Tuan, Mechanism for improving performance on XML over XML data using path subsetting.
  56. Murthy,Ravi; Krishnaprasad,Muralidhar; Chandrasekar,Sivasankaran; Sedlar,Eric; Krishnamurthy,Viswanathan; Agarwal,Nipun, Mechanism for mapping XML schemas to object-relational database systems.
  57. Murthy,Ravi; Sedlar,Eric; Agarwal,Nipun; Idicula,Sam; Montoya,Nicolas, Mechanism for uniform access control in a database system.
  58. Jalali,Neema; Sedlar,Eric; Agarwal,Nipun; Murthy,Ravi, Mechanism to efficiently index structured data that provides hierarchical access in a relational database system.
  59. Murthy,Ravi; Sedlar,Eric; Agarwal,Nipun; Jalali,Neema, Mechanisms for storing content and properties of hierarchically organized resources.
  60. Black, Robert Barth, Method and aparatus for presence based resource management.
  61. Kay, James, Method and apparatus for electronic mail filtering.
  62. Kay, James, Method and apparatus for electronic mail filtering.
  63. Kay, James, Method and apparatus for electronic mail filtering.
  64. Black, Robert Barth, Method and apparatus for presence based resource management.
  65. Morsa, Steve, Method and apparatus for the furnishing of benefits information and benefits.
  66. Tagg, Bradley S., Method and system for controlling access to a source application.
  67. Yu, Won Uk, Method for accessing internet using internet TV.
  68. Burr, Michael John; Shah, Rajeeta Lalji; Ullmann, Lorin Evan, Methods and apparatus in a logging system for the adaptive logger replacement in order to receive pre-boot information.
  69. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  70. Govindarajan,Rajagopalan; Krishnamurthy,Viswanathan; Nori,Anil, Opaque types.
  71. Agarwal,Nipun; Murthy,Ravi; Sedlar,Eric; Chandrasekar,Sivasankaran; Ge,Fei, Operators for accessing hierarchical data in a relational system.
  72. Krishnaprasad, Muralidhar; Liu, Zhen Hua; Arora, Vikas, Optimization of queries on a repository based on constraints on how the data is stored in the repository.
  73. Manikutty, Anand; Krishnaprasad, Muralidhar; Liu, Zhen Hua; Arora, Vikas; Warner, James W.; Angrish, Rohan; Zhang, Hui, Optimization of queries over XML views that are based on union all operators.
  74. Zhang, Ning; Chandrasekar, Sivasankaran; Agarwal, Nipun; Idicula, Sam, Optimized streaming evaluation of XML queries.
  75. Korenshtein, Roni, Page prerequisite control mechanism.
  76. Korenshtein, Roni, Page sub-component prerequisite control mechanism.
  77. Idicula, Sam; Agarwal, Nipun; Murthy, Ravi; Sedlar, Eric, Path-caching mechanism to improve performance of path-related operations in a repository.
  78. Idicula, Sam; Agarwal, Nipun; Murthy, Ravi; Sedlar, Eric, Path-caching mechanism to improve performance of path-related operations in a repository.
  79. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Policy inheritance through nested groups.
  80. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  81. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Processor configured to allocate resources using an entitlement vector.
  82. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Processor operable to ensure code integrity.
  83. Agarwal,Nipun; Sedlar,Eric; Murthy,Ravi; Jain,Namit, Providing a consistent hierarchical abstraction of relational data.
  84. Agarwal,Nipun; Sedlar,Eric; Murthy,Ravi; Jain,Namit, Providing a consistent hierarchical abstraction of relational data.
  85. Joshi,Vrinda S.; Thiyagarajan,Lakshmi Velandai, Providing data to applications from an access system.
  86. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  87. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Scheduling threads based on priority utilizing entitlement vectors, weight and usage level.
  88. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security control module.
  89. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Security perimeter.
  90. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security provider development model.
  91. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  92. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  93. Krishnamurthy, Sanjay M., Storing XML documents efficiently in an RDBMS.
  94. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  95. Choy,David Mun Hien, System and method for RDBMS to protect records in accordance with non-RDBMS access control rules.
  96. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for analyzing security policies in a distributed computer network.
  97. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  98. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  99. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  100. Taneja, Deepak; Bhamidipati, Prasad V.; Byragani, Bushan Yadav; Nadimpalli, Sanjay; Lull, Joaquin, System and method for collecting and normalizing entitlement data within an enterprise.
  101. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  102. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  103. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  104. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  105. Choy,David Mun Hien; Raghavan,Sriram, System and method for ensuring referential integrity for heterogeneously scoped references in an information management system.
  106. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for incrementally distributing a security policy in a computer network.
  107. Choy, David Mun-Hien, System and method for inheriting access control rules.
  108. Moriconi, Mark S., System and method for maintaining security in a distributed computer network.
  109. Moriconi, Mark; Qian, Shelly, System and method for maintaining security in a distributed computer network.
  110. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  111. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  112. Moses, Fred, System and method for managing objects and resources with access rights embedded in nodes within a hierarchical tree structure.
  113. Moses,Fred, System and method for managing objects and resources with access rights embedded in nodes within a hierarchical tree structure.
  114. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  115. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  116. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  117. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  118. Hubbard, Dan, System and method of controlling access to the internet.
  119. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  120. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  121. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  122. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  123. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  124. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  125. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  126. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  127. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  128. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  129. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  130. Royer,Barry Lynn; Heil,John Andrew, System and user interface supporting processing and activity management for concurrently operating applications.
  131. Graylin,William; Campbell,William R.; Moses,Fred, System for and method of storing and elaborating user preferences.
  132. Cichowlas,Bruce, System for and methods of administration of access control to numerous resources and objects.
  133. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  134. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  135. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  136. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  137. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  138. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  139. Anders, Karen A.; Bermender, Pamela A.; Pham, Phong Anh, Systems and methods for configurable entitlement management.
  140. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  141. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  142. Gilbert, Lanny, Systems and methods for limiting web site access.
  143. Gilbert, Lanny, Systems and methods for limiting web site access.
  144. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  145. Glew, Andrew F.; Gerrity, Daniel A.; Tegreene, Clarence T., Taint injection and tracking.
  146. Idicula, Sam; Murthy, Ravi; Chandrasekar, Sivasankaran; Agarwal, Nipun, Technique to estimate the cost of streaming evaluation of XPaths.
  147. Idicula, Sam; Zhang, Ning; Chandrasekar, Sivasankaran; Agarwal, Nipun, Techniques for more efficient generation of XML events from XML data sources.
  148. Murthy,Ravi; Krishnaprasad,Muralidhar; Manikutty,Anand; Liu,Zhen; Warner,James, Techniques for retaining hierarchical information in mapping between XML documents and relational data.
  149. Manikutty,Anand; Krishnaprasad,Muralidhar; Murthy,Ravi; Liu,Zhen; Muralidhar,Subramanian; Warner,James; Chandrasekar,Sivasankaran, Techniques for rewriting XML queries directed to relational database constructs.
  150. Warner, James W.; Liu, Zhen Hua; Krishnaprasad, Muralidhar, Techniques for serialization of instances of the XQuery data model.
  151. Liu,Zhen Hua; Krishnaprasad,Muralidhar, Techniques of using a relational caching framework for efficiently handling XML queries in the mid-tier data caching.
  152. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  153. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  154. Baschy, Leo Martin, User interface driven access control system and method.
  155. Baschy, Leo Martin, User interface driven access control system and methods for multiple users as one audience.
  156. Baschy, Leo, User interface for nonuniform access control system and methods.
  157. Baschy, Leo M., User interface for variable access control system.
  158. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  159. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  160. Chandrasekar, Sivasankaran; Murthy, Ravi; Baby, Thomas; Agarwal, Nipun, Using sibling-count in XML indexes to optimize single-path queries.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로