$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Information sharing system and method with requester dependent sharing and security rules 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0040522 (1998-03-16)
발명자 / 주소
  • Wiederhold Gio
대리인 / 주소
    Pennie & Edmonds LLP
인용정보 피인용 횟수 : 158  인용 특허 : 9

초록

A security mediator system is used in a computer system having a database of information to be shared with authorized users in accordance with pre-defined constraints. A rules database stores rules, including query pre-processing rules and query results post-processing rules. The rules database incl

대표청구항

[ What is claimed is:] [1.]1. A security system for use in a computer system having a database of information to be shared with authorized users in accordance with pre-defined constraints, comprising:a port for receiving queries requesting information from the database;means for accessing a set of r

이 특허에 인용된 특허 (9)

  1. Miller Donald V. (Los Altos CA), Access restriction facility method and apparatus.
  2. Thuraisingham Bhavani Marienne (Lexington MA) Ford William Rose Barlett (Billerica MA), Apparatus and method for the detection of security violations in multilevel secure databases.
  3. Thuraisingham Bhavani M. (Lexington MA), Apparatus for design of a multilevel secure database management system based on a multilevel logic programming system.
  4. Sweeney Christopher Lee ; Stodghill Scott A. ; DeShazer Kurt A. ; Marimuthu Aravindan, Application and database security and integrity system and method.
  5. Hart Keith,GBX, Control of database access using security/user tag correspondence table.
  6. Abraham Robert L. (Marietta GA) Mitchell Herman (Lithonia GA) Panuganti Badari N. (Mableton GA) Stowers Laura A. (Smyrna GA), Method and apparatus for controlling access to data elements in a data processing system based on status of an industria.
  7. Schaefer Marvin ; Martel Paul A. ; Kanawati Antoun J. ; Wade Sandra A., Secure multilevel object oriented database management system.
  8. Hayman Kenneth John ; Keene Michael Donovan ; Lewine Eric Scott ; Meyers William James ; Spencer Jon Frederick ; Taylor ; II Millard Cranford, Security system for computer systems.
  9. Thuraisngham Bhavani M. (209 Katardin Rd. Lexington MA 02173) Ford William R. B. (13 Coach Rd. Billerica MA 01862) Collins Marie S. (4452 Wordsworth Rd. Plano TX 75093) O\Keeffe Jonathan P. (70 JFK B, System for multilevel secure database management using a knowledge base with release-based and other security constraint.

이 특허를 인용한 특허 (158)

  1. Wall, David A., Administering medical digital images in a distributed medical digital image computing environment with medical image caching.
  2. Dubbels, Joel C.; Stevens, Richard J.; Wall, David A., Administering medical digital images with intelligent analytic execution of workflows.
  3. Ranalletta, Joseph V.; Ward, Brian William; Kingsford, Timothy Lee, Anti-tampering apparatus and method for drug delivery devices.
  4. Ranalletta, Joseph Vincent; Ward, Brian William; Kingsford, Timothy Lee, Anti-tampering apparatus and method for drug delivery devices.
  5. Sato,Makoto, Apparatus and method for creating a map of a real name word to an anonymous word for an electronic document.
  6. Dubbels, Joel C.; Glowacki, Janice R.; Stevens, Richard J., Auditing database access in a distributed medical computing environment.
  7. Dubbels, Joel C.; Glowacki, Janice R.; Stevens, Richard J., Auditing database access in a distributed medical computing environment.
  8. Bender, Jayson Lee; Kenney, Michael J.; Khan, Abdul Wahid; Wolford, G. Rodney, Automated drug preparation apparatus including a bluetooth communications network.
  9. Tribble, Dennis; Osborne, Joel A.; Khan, Abdul Wahid; Lefebre, Edward J., Automated drug preparation apparatus including automated drug reconstitution.
  10. Osborne, Joel A.; Tribble, Dennis; Khan, Abdul Wahid; Wallace, Morris W.; Lefebre, Edward J., Automated drug preparation apparatus including syringe loading, preparation and filling.
  11. Osborne, Joel A.; Tribble, Dennis; Khan, Abdul Wahid; Wallace, Morris W.; Lefebre, Edward J., Automated drug preparation apparatus including syringe loading, preparation and filling.
  12. Nadalin, Anthony J.; Wesley, Ajamu A., Context-sensitive confidentiality within federated environments.
  13. Nadalin, Anthony J.; Wesley, Ajamu A., Context-sensitive confidentiality within federated environments.
  14. Nadalin,Anthony J.; Wesley,Ajamu A., Context-sensitive confidentiality within federated environments.
  15. Arasu, Arvind; Eguro, Kenneth Hiroshi; Ramamurthy, Ravishankar; Shriraghav, Kaushik, Customized trusted computer for secure data processing and storage.
  16. Lacan, Francis M.; Perez, Ronald; Shub, Michael I.; Tresser, Charles P., Data management system.
  17. Lacan,Francis M.; Perez,Ronald; Shub,Michael I.; Tresser,Charles P., Data management system and method.
  18. Branson, Michael J.; Santosuosso, John M., Data security for a database in a multi-nodal environment.
  19. Selman, Daniel; Bergman, Robert; O'Neil, Edward K., Data synchronization.
  20. Selman,Daniel; Bergman,Robert; O'Neil,Edward K., Data synchronization.
  21. Osborne, Joel A.; Tribble, Dennis; Khan, Abdul Wahid; Valentine, Matthew; Olaen, Greg; Rasmussen, Randall E., Data transmission capture in support of medication preparation.
  22. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Delegated administration for a distributed security system.
  23. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  24. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  25. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  26. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  27. Dubbels, Joel C.; Stevens, Richard J., Dynamically allocating business workflows.
  28. Dubbels, Joel C.; Stevens, Richard J., Dynamically allocating data processing components.
  29. Griffin,Philip B.; Hallock,Troy; Posner,Brad; Osborne,Patrick; Libouban,Olivier; Devgan,Manish; Rohra,Ravi; Gupta,Jitendra; Sengupta,Somenath; Ma,Hung T.; Lin,Chengjiang, Enterprise application platform.
  30. Griffin,Philip B.; Hallock,Troy; Posner,Brad; Osborne,Patrick; Libouban,Olivier; Devgan,Manish; Rohra,Ravi; Gupta,Jitendra; Sengupta,Somenath; Ma,Hung T.; Lin,Chengjiang C., Enterprise application platform.
  31. Atkins,Barry D.; Melgar,David O.; Nadalin,Anthony J.; Wesley,Ajamu A., Federated identity management within a distributed portal server.
  32. Owen, James; Smith, Gregory P.; McCauley, Rodney; Toussaint, Alexandre; Conti, Joseph; Patadia, Jalpesh, Federated management of content repositories.
  33. Owen,James; Smith,Gregory; McCauley,Rodney; Toussaint,Alexander; Conti,Joseph; Patadia,Jalpesh, Federated management of content repositories.
  34. Owen,James; Smith,Gregory; McCauley,Rodney; Toussaint,Alexander; Conti,Joseph; Patadia,Jalpesh, Federated management of content repositories.
  35. Chan, Eric; Weissman, Craig; Nakada, Paul; Moellenhoff, Dave; McKinnon, Todd, Firewalls for securing customer data in a multi-tenant environment.
  36. Sposetti, Jeffrey Thomas; Greysman, Lev, Groupware portlets for integrating a portal with groupware systems.
  37. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  38. Ferrari,Adam J.; Gourley,David; Johnson,Keith; Knabe,Frederick C.; Tunkelang,Daniel; Walter,John S., Hierarchical data-driven navigation system and method for information retrieval.
  39. Ferrari, Adam J.; Gourley, David J.; Johnson, Keith A.; Knabe, Frederick C.; Mohta, Vinay B.; Tunkelang, Daniel; Walter, John S., Hierarchical data-driven search and navigation system and method for information retrieval.
  40. Ferrari,Adam J.; Gourley,David J.; Johnson,Keith A.; Knabe,Frederick C.; Mohta,Vinay B.; Tunkelang,Daniel; Walter,John S., Hierarchical data-driven search and navigation system and method for information retrieval.
  41. Rossmann, Alain, Hybrid systems for securing digital assets.
  42. Bhattacharjee, Bishwaranjan; Dan, Asit, Identification, notification, and control of data access quantity and patterns.
  43. Felsher, David Paul, Information record infrastructure, system and method.
  44. Ferrari,Adam J.; Lau,Andrew M.; Mohta,Vinay B.; Tunkelang,Daniel; Walter,John S., Integrated application for manipulating content in a hierarchical data-driven search and navigation system.
  45. Dettinger, Richard D.; Stevens, Richard J., Intelligent use of user data to pre-emptively prevent execution of a query violating access controls.
  46. Tribble, Dennis; Khan, Abdul Wahid; Schneider, Dennis; Olsen, Gregory T.; Bender, Jayson Lee; Padmani, Bhavesh S.; Valentine, Matthew A., Management, reporting and benchmarking of medication preparation.
  47. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  48. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  49. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  50. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  51. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  52. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  53. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  54. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  55. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  56. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  57. Zelevinsky, Vladimir V.; Tunkelang, Daniel; Knabe, Frederick C.; Saji, Michael Y.; Tzanov, Velin Krassimirov, Method and system for information retrieval with clustering.
  58. McVeigh, Ryan Sean; Roth, Steven Leslie; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, Method and system for interacting with a virtual content repository.
  59. Vainstein, Klimenty, Method and system for managing security tiers.
  60. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  61. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  62. Nath, Satyajit, Method and system for providing document retention using cryptography.
  63. Nath, Satyajit, Method and system for providing document retention using cryptography.
  64. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  65. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  66. Devgan, Manish; McCauley, Rodney, Method for delegated administration.
  67. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, Method for delegated administration.
  68. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, Method for role and resource policy management.
  69. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, Method for role and resource policy management optimization.
  70. Osentoski, Dennis D.; Stark, Randall A., Method of and system for dynamically controlling access to data records.
  71. Dettinger, Richard D.; Stevens, Richard J., Method of query return data analysis for early warning indicators of possible security exposures.
  72. Hartman, Bret A.; Flinn, Donald J.; Burghart, Jr., Theodore R., Methods and apparatus for facilitating security in a network.
  73. Aver,Jon B.; Terek,Soner F., Methods and systems for allowing third party client applications to influence implementation of high-level document commands.
  74. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  75. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  76. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  77. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  78. Rhee, Ann; Chatterjee, Sumanta; Loaiza, Juan, Methods for automatic group switching according to a resource plan.
  79. Rhee,Ann; Chatterjee,Sumanta; Loaiza,Juan, Methods for selectively quiescing a computer system.
  80. Schapker, Lawrence E.; Theranikal, Jayagopal, Multi-database, runtime database query performance monitoring.
  81. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  82. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  83. Watsen, Kent Andrew; Sancheti, Ajit, Network management using hierarchical domains.
  84. Watanabe,Naoki; Takamoto,Yoshifumi; Odawara,Hiroaki, Network-attached disk unit with data protection function and server protecting data stored in network-attached disk device.
  85. DeMoss, Matthew Daniel; Roth, Gregory Branchek; Mikulski, Andrew Paul, Password security.
  86. Schaefer,Robert G.; Wardhan,Harsh, Performance path method and apparatus for exchanging data among systems using different data formats.
  87. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Policy inheritance through nested groups.
  88. Copeland, George Prentice; Lu, Yong, Predicate based group management.
  89. Drucker, Travis M.; Dubbels, Joel C.; Rapp, William C.; Stevens, Richard J.; Wall, David A., Processing system using metadata for administering a business transaction.
  90. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  91. Wagner, Todd R.; Plourde, Robert W.; O'Halloran, J. Patrick; Corugedo, George R.; Tyner, Chuck, Real-time collaboration and workflow management for a marketing campaign.
  92. Ben S. Wymore ; Christopher H. Genly ; David G. Hicks, Recording information in response to spoken requests.
  93. Dettinger, Richard D.; Glowacki, Janice R.; Kolz, Daniel P.; Rao, Padma S.; Sperber, Marci L.; Wenzel, Shannon E., Restricting access to sensitive data.
  94. Cook, William R.; Gannholm, Martin R., Rule based database security system and method.
  95. Ferrari, Adam; Gourley, David; Johnson, Keith; Knabe, Frederick; Lau, Andrew; Mohta, Vinay; Tunkelang, Daniel; Walter, John, Scalable hierarchical data-driven navigation system and method for information retrieval.
  96. Jacob, Sanjay; Vogt, Robert L.; Schmidt, Kevin Robert; Yang, Xiaohong Mark; Yan, Peiyuan, Secure authoring and execution of user-entered database programming.
  97. Garcia,Denis Jacques Paul, Secured data format for access control.
  98. Doyle, Ronald P.; Hind, John R.; Stockton, Marcia L., Security containers for document components.
  99. Doyle, Ronald P.; Hind, John R.; Stockton, Marcia L., Security containers for document components.
  100. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security control module.
  101. Pazdziora, Jan, Security policy management.
  102. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security provider development model.
  103. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  104. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  105. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  106. Tribble,Dennis; Osborne,Joel A., Serial data capture and processing.
  107. Griffin,Philip B., System and method for XML data representation of portlets.
  108. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for analyzing security policies in a distributed computer network.
  109. Jolley,Chris; Giridhar,Sathyanarayana; Griffin,Philip B.; Howes,Jason; O'Neil,Edward K.; Patadia,Jalpesh, System and method for application flow integration in a portal framework.
  110. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  111. McCauley,Rodney; Owen,James; Bales,Christopher E., System and method for content lifecycles in a virtual content repository that integrates a plurality of content repositories.
  112. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for controlling access to anode in a virtual content repository that integrates a plurality of content repositories.
  113. Moran,Douglas B., System and method for detecting computer intrusions.
  114. Smithline,Neil; Giridhar,Sathyanarayana, System and method for determining the functionality of a software application based on nodes within the software application and transitions between the nodes.
  115. Patrick, Paul B., System and method for dynamic role association.
  116. Gluzman Peregrine, Vladimir; Rosen, Alexander D.; Scarlet, Benjamin S.; Volpe, Andrew, System and method for filtering rules for manipulating search results in a hierarchical search and navigation system.
  117. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for generating fictitious content for a computer.
  118. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, System and method for hierarchical role-based entitlements.
  119. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, System and method for hierarchical role-based entitlements.
  120. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  121. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for incrementally distributing a security policy in a computer network.
  122. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for information lifecycle workflow integration.
  123. Ferrari, Adam J.; Knabe, Frederick C.; Mohta, Vinay Seth; Myatt, Jason Paul; Scarlet, Benjamin S.; Tunkelang, Daniel; Walter, John S.; Wang, Joyce; Tucker, Michael, System and method for information retrieval from object collections with complex interrelationships.
  124. McVeigh,Ryan Sean; Roth,Steven Leslie; Patadia,Jalpesh; Saarva,Tanya; Zhou,Xiaojiang; Posner,Brad, System and method for lightweight loading for managing content.
  125. Moriconi, Mark S., System and method for maintaining security in a distributed computer network.
  126. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  127. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  128. Ferrari,Adam J.; Gourley,David J.; Johnson,Keith A.; Knabe,Frederick C.; Mohta,Vinay B.; Tunkelang,Daniel; Walter,John S.; Lau,Andrew, System and method for manipulating content in a hierarchical data-driven search and navigation system.
  129. Haut,John; Griffin,Philip B.; Patadia,Jalpesh; Willcox,Steven; Breeden,Timothy, System and method for portal page layout.
  130. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for preventing detection of a selected process running on a computer.
  131. Chen, Hong; Hsu, Windsor Wee Sun; Ma, Xiaonan, System and method for privacy preserving query verification.
  132. McVeigh, Ryan Sean; Roth, Steven Leslie; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, System and method for providing SPI extensions for content management system.
  133. McCauley,Rodney; Owen,James; Bales,Christopher E., System and method for providing a lifecycle for information in a virtual content repository.
  134. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for providing content services to a repository.
  135. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  136. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  137. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for providing lifecycles for custom content in a virtual content repository.
  138. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  139. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  140. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  141. McVeigh, Ryan Sean; Roth, Steven L.; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, System and method for providing nested types for content management.
  142. Griffin,Philip B.; Devgan,Manish; Howes,Jason; Dunbar,Scott, System and method for rule-based entitlements.
  143. McCauley, Rodney; Owen, James; Bales, Christopher E., System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories.
  144. Patrick,Paul, System and method for server security and entitlement processing.
  145. Moran, Douglas B., System and method for using timestamps to detect attacks.
  146. McCauley,Rodney; Owen,James; Bales,Christopher E., System and method for viewing a virtual content repository.
  147. Smith,Greg; Olander,Daryl B.; Stamm,Tom; Bergman,Robert; Cook,Thomas A., System and method for web-based personalization and ecommerce management.
  148. Freund,Gregor, System and methodology for providing community-based security policies.
  149. Miller, Sam Stanley, System for electronically recording and sharing medical information.
  150. Smithline,Neil; Giridhar,Sathyanarayana, System for managing logical process flow in an online environment.
  151. Bales, Christopher E.; Mueller, Jeffrey; Owen, James; Patadia, Jalpesh; Olson, Nathan; Devgan, Manish; Noonan, Timothy, Systems and methods for personalizing a portal.
  152. Chan, Eric; Weissman, Craig; Nakada, Paul; Moellenhoff, Dave; McKinnon, Todd, Systems and methods for securing customer data in a multi-tenant environment.
  153. Owen, James; Conti, Joseph; Choe, Chang; Patadia, Jalpesh; Smith, Gregory, Virtual content repository application program interface.
  154. Patadia, Jalpesh; McCauley, Rodney; Toussaint, Alexander, Virtual content repository browser.
  155. Owen,James; Choe,Chang, Virtual repository complex content model.
  156. Owen,James; Choe,Chang, Virtual repository content model.
  157. Bales, Christopher E.; Musson, Scott; Patadia, Jalpesh; Beecroft, Troy, Web service-enabled portlet wizard.
  158. Parthasarathy, Krishna Kumar; Panasyuk, Anatoliy, Zone classification of electronic mail messages.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로