$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure network file access controller implementing access control and auditing 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04L-009/32
  • G06F-011/30
  • G06F-012/14
출원번호 US-0201358 (2002-07-22)
§371/§102 date 20000607 (20000607)
발명자 / 주소
  • Pham, Duc
  • Nguyen, Tien Le
  • Zhang, Pu Paul
  • Lo, Mingchen
출원인 / 주소
  • Vormetric, Inc.
대리인 / 주소
    NewTechLaw
인용정보 피인용 횟수 : 125  인용 특허 : 119

초록

A network file access appliance operates as a secure portal for network file access operations between client computer systems and network storage resources. The file access appliance terminates network file access transactions, identified by packet information including client system, mount point,

대표청구항

1. A secure portal for network file access transactions between client computer systems and network storage resources, said secure portal comprising:a) a network interface supporting network connections to a client system and a network storage resource, respectively; and b) an access controller coup

이 특허에 인용된 특허 (119)

  1. Andreas V. Bechtolsheim ; David R. Cheriton, Access control list processing in hardware.
  2. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  3. Epstein, Jeremy; Thomas, Linda, Advanced data guard having independently wrapped components.
  4. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  5. Chin Hon Wah, Arrangement for rendering forwarding decisions for packets transferred among network switches.
  6. Hauser Stephen A. ; Caldara Stephen A. ; Manning Thomas A. ; McClure Robert B., Asynchronous transfer mode based service consolidation switch.
  7. Buhle Gordon ; Wessman Richard R., Authentication and authorization in a multi-tier relational database management system.
  8. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  9. Gauvin William J. ; Cheung Raymond ; Brosnan Kevin P. ; Taranto Edward J., Client application program mobilizer.
  10. Ballard Clinton L., Client-side load-balancing in client server network.
  11. Sanchaita Datta ; Ragula Bhaskar, Combining routers to increase concurrency and redundancy in external network access.
  12. Lin Cher-Wen ; Ramaswamy Kumar ; Rahman Mizanur Mohammed ; Rettberg Randall David ; Doolittle Robert Arthur, Computer data packet switching and load balancing system using a general-purpose multiprocessor architecture.
  13. Brownlie Michael,CAX ; Hillier Stephen,CAX ; Van Oorschot Paul C.,CAX, Computer network security system and method having unilateral enforceable security policy provision.
  14. Cummins Marty T. (Rochester MI), Computer software encryption apparatus.
  15. Hsu Mike S. C. (1518 Ambergrove Dr. San Jose CA 95131), Computer system including a transparent and secure file transform mechanism.
  16. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
  17. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Connection authorizer for controlling access to system resources.
  18. Peirce, Jr., Kenneth L.; Xu, Yingchun; Mortsolf, Timothy Glenn; Harper, Matthew, Control and coordination of encryption and compression between network entities.
  19. Ballard C. Bare, Cost propagation switch protocols.
  20. Bellovin Steven M. (Westfield NJ) Merritt Michael J. (Berkeley Heights NJ), Cryptographic protocol for remote authentication.
  21. Thomas Collins ; John Gregory ; Ralph Bestock, Cryptographic system.
  22. Randal Chilton Burns ; Edward Gustav Chron ; Darrell Long ; Benjamin Clay Reed, Decentralized remotely encrypted file system.
  23. Paul Kanevsky ; Anthony C. Pizi ; Thomas Tsao ; Daniel Tyler, Distributed adaptive computing.
  24. Knight, John; Roden, Thomas Anthony; Shively, II, Darrell Myers; Chen, Pauline; Patil, Kavita Shekhar; Bui, Sonny, Distributed database system with authoritative node.
  25. Raz Yoav ; Vishlitzky Natan ; Alterescu Bruno, Dynamic load balancing.
  26. Bedard Fran.cedilla.ois,CAX ; Regnier Jean,CAX ; Caron France,CAX, Dynamically controlled routing using dynamic management of intra-link traffic to virtual destination nodes.
  27. Engel, Robert; Barzilai, Tsipora P.; Kandlur, Dilip Dinkar; Mehra, Ashish, Efficient classification, manipulation, and control of network transmissions by associating network flows with rule based functions.
  28. Wei-Ting Yu TW, Electrical connector.
  29. Brundrett Peter ; Garg Praerit ; Gu Jianrong ; Kelly ; Jr. James W. ; Kaplan Keith S. ; Reichel Robert P. ; Andrew Brian ; Kimura Gary D. ; Miller Thomas J., Encrypting file system and method.
  30. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  31. Atalla Martin M. (Atherton CA), File access security method and means.
  32. Nozawa Masafumi (Odawara JPX) Shimada Akinobu (Hiratsuka JPX) Nishimura Toshifumi (Minamiashigara JPX) Kakuse Katsuharu (Hadano JPX) Tsukiyama Tokuhiro (Kanagawa JPX) Yata Kiyoshi (Hadano JPX) Ishii , File encryption method and file cryptographic system.
  33. Akizawa Mitsuru (Hachioji JPX) Yamashita Hirofumi (Yokohama JPX) Kawaguchi Hisamitsu (Sagamihara JPX) Tada Katsumi (Yokohama JPX) Kato Kanji (Yokohama JPX) Kito Akira (Ebina JPX) Yamada Hidenori (Had, File server system and file access control method of the same.
  34. Dahlgren Kent Blair ; Bedell Daniel J., Hierarchical address translation system for a network switch.
  35. Sindhu Pradeep S. ; Anand Ramalingam K. ; Ferguson Dennis C. ; Liencres Bjorn O., High speed switching device.
  36. Pi-Yu Chung ; Om P. Damani ; Yennun Huang ; Chandra M. Kintala ; Yi-Min Wang, Hosting a network service on a cluster of servers using a single-address image.
  37. Raz Uri, Information transfer systems and method with dynamic distribution of data, control and management of information.
  38. Wright Steven R. ; Brook Christopher T., Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network.
  39. Kevin Michael Jordan ; Kun-Lung Wu ; Philip Shi-Lung Yu, Load balancing cooperating cache servers by shifting forwarded request.
  40. Jindal Anita ; Lim Swee Boon ; Radia Sanjay ; Chang Whei-Ling, Load balancing in a network environment.
  41. Allon David (Jerusalem ILX) Bach Moshe (Haifa ILX) Moatti Yosef (Haifa ILX) Teperman Abraham (Haifa ILX), Load balancing of network by maintaining in each computer information regarding current load on the computer and load on.
  42. Philip Shi-Lung Yu, Loading balancing across servers in a computer network.
  43. Ullum Daniel ; Edsall Thomas J. ; Hang Soei-Shin, Look up mechanism and associated hash table for a network switch.
  44. Bakke Mark A. (Maple Grove MN) Fiore Edward J. (Ramsey MN), Method and apparatus for accelerated packet forwarding.
  45. Adelman Kenneth Allen ; Kashtan David Lyon ; Palter William L. ; Piper ; II Derrell D., Method and apparatus for an internet protocol (IP) network clustering system.
  46. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  47. Blumenau Steven M., Method and apparatus for authenticating connections to a storage system coupled to a network.
  48. Kingdon Kevin (Orem UT), Method and apparatus for authentication of client server communication.
  49. Carter Stephen R., Method and apparatus for collaborative document control.
  50. Pedersen Bradley J., Method and apparatus for connecting a client node to a server node based on load levels.
  51. Yu Philip Shi-Lung, Method and apparatus for dynamic interval-based load balancing.
  52. Timothy E. Moses CA; Glenn C. Langford CA, Method and apparatus for facilitating information security policy control on a per security engine user basis.
  53. Schibler Ross M. (San Mateo CA) Topol A. Mitchell (Mountain View CA) Duffie P. Kingston (Palo Alto CA), Method and apparatus for generating route information for asynchronous transfer mode cell processing.
  54. Crichton Joseph M. ; Garvin Peter F. ; Staten Jeffrey W. ; Wright Waiki L., Method and apparatus for lightweight secure communication tunneling over the internet.
  55. Partridge Craig ; Milliken Walter C., Method and apparatus for multiplexing bytes over parallel communications links using data slices.
  56. Arnold Todd Weston, Method and apparatus for protecting application data in secure storage areas.
  57. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media.
  58. Watson Colin (Issaquah WA) Herron Andrew M. (Issaquah WA), Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a cl.
  59. Malkin Gary ; Kossack Nancy ; Raison Paul ; Tran Thuan ; Wong Ellis L., Method and apparatus for transparently providing mobile network functionality.
  60. Nikander Pekka,FIX ; Ylonen Tatu,FIX, Method and arrangement for implementing IPSEC policy management using filter code.
  61. Tatu Ylonen FI; Tero Kivinen FI, Method and arrangement for secure tunneling of data between virtual routers.
  62. Peirce Kenneth L. ; Calhoun Patrick ; Harper Matthew H. ; Schoo Daniel L. ; Vakil Sumit, Method and system for coordination and control of data streams that terminate at different termination units using virtual tunneling.
  63. Takashima Youichi (Kanagawaken JPX) Ishii Shinji (Kanagawaken JPX) Yamanaka Kiyoshi (Kanagawaken JPX), Method and system for digital information protection.
  64. Gorczyca Robert ; Rashid Aamir Arshad ; Rodgers Kevin Forress ; Warnsman Stuart ; Weaver Thomas Van, Method and system for dynamically reconfiguring a cluster of computer systems.
  65. Kazar, Michael L.; Nydick, Daniel S.; Sanzi, Jr., Richard N.; Gohh, Fred; Bianchini, Jr., Ronald P.; Speiser, Benjamin, Method and system for responding to file system requests.
  66. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  67. Theimer Marvin M. (Mountain View CA) Nichols David A. (Mountain View CA) Terry Douglas B. (San Carlos CA), Method for delegating access rights through executable access control program without delegating access rights not in a.
  68. Raman Anant ; Rungta Sanjay, Method for determining a networking capability index for each of a plurality of networked computers and load balancing.
  69. Bass Walter E. (Sunnyvale CA) Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Method for establishing user authenication with composite session keys among cryptographically communicating nodes.
  70. Witte Martin (Ulm DEX) Oehlerich Joerg (Stockdorf DEX) Held Walter (Geretsried DEX), Method for load balancing in a multi-processor system where arising jobs are processed by a plurality of processors unde.
  71. Puhl Larry C. (Sleepy Hollow IL) Finkelstein Louis D. (Wheeling IL) Dabbish Ezzat A. (Cary IL), Method for providing blind access to an encryption key.
  72. Case Jeffrey D., Method for secure key production.
  73. Zizzi Stephen, Method of transparent encryption and decryption for an electronic document management system.
  74. Johnson, Kirk L.; Kaashoek, M. Franz, Methods and apparatus for routing requests in a network.
  75. Kent K. Leung, Mobile IP mobility agent standby protocol.
  76. Matti Turunen FI, Mobile internet access.
  77. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  78. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  79. Williams Timothy C., Multi-level security network system.
  80. Lin David Dah-Haur ; Shaheen Amal Ahmed ; Yellepeddy Krishna Kishore, Multiple remote data access security mechanism for multitiered internet computer networks.
  81. Dellacona Richard, Network information server.
  82. Nguyen Minhtam C. (335 Elan Village La. ; Apt. 217 San Jose CA 95134), Network with secure communications sessions.
  83. Madoukh Ashraf T., Object-based security system.
  84. Madoukh, Ashraf T., Object-based security system.
  85. Narad Charles E. ; Fall Kevin ; MacAvoy Neil ; Shankar Pradip ; Rand Leonard M. ; Hall Jerry J., Packet processing system including a policy engine having a classification unit.
  86. Lumelsky, Leon L.; Manohar, Nelson R.; Wood, Stephen P., Policy-based multivariate application-level QoS negotiation for multimedia services.
  87. Warrier Padmanand ; Richter Roger, Scaleable network system for remote access of a local network.
  88. Burns Randal Chilton ; Chron Edward Gustav ; Long Darrell ; Reed Benjamin Clay, Secure array of remotely encrypted storage devices.
  89. Boebert William E. (Minneapolis MN) Hanson Mark H. (Eagan MN) Markham Thomas R. (Anoka MN), Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local wo.
  90. Cane David ; Hirschman David ; Speare Philip ; Vaitzblit Lev, Secure file archive through encryption key management.
  91. McManis Charles E. (Sunnyvale CA), Secure network protocol system and method.
  92. Andrew W. Trieger, Secure session tracking method and system for client-server environment.
  93. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  94. Elgamal Taher ; Hickman Kipp E.B., Secure socket layer application program apparatus and method.
  95. Chan Steve S. C. (P.O. Box 34620 Chicago IL 60634), Secured data storage devices.
  96. Pravetz James D. ; Malloy Thomas J., Secured document access control using recipient lists.
  97. Dan Linh Nguyen, Security between client and server in a computer network.
  98. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  99. Inala Suman Kumar ; Rangan P Venkat ; Satyavolu Ramakrishna, Server-side web summary generation and presentation.
  100. Stanton Leroy K. ; Wright Steven R. ; Brook Christopher T. ; Loane Russell F., Session key recovery system and method.
  101. Kumar Ramaswamy ; Cher-Wen Lin ; Randall David Rettberg ; Mizanur Mohammed Rahman, Software interface between switching module and operating system of a data packet switching and load balancing system.
  102. Locklear ; Jr. Robert H. ; Cantrell Craig S. ; McClanahan Kip R. ; Brewer William K. ; Carew Anthony J. P., Switched architecture access server.
  103. Moran, Douglas B., System and method for analyzing filesystems to detect intrusions.
  104. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  105. Shimada Kazutoshi,JPX, System and method for controlling access to subject data using location data associated with the subject data and a requ.
  106. Harrison, Bret Elliott; Reed, William Donald; Temoshenko, Leo, System and method for generation VPN network policies.
  107. Wright Tim ; Marconi Peter ; Conlin Richard ; Opalka Zbigniew, System architecture for and method of dual path data processing and management of packets and/or cells and the like.
  108. Opalka Zbigniew ; Aggarwal Vijay ; Kong Thomas ; Firth Christopher ; Costantino Carl, System architecture for and method of processing packets and/or cells in a common switch.
  109. East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
  110. Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., System for on-line service in which gateway computer uses service map which includes loading condition of servers broad.
  111. Scheifler Robert W., System for separately designating security requirements for methods invoked on a computer.
  112. Berger David A. ; Weber Jay C. ; Madapurmath Vilas I., System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible archite.
  113. Brown, Eric William; Coden, Anni R.; Prager, John Martin; Radev, Dragomir Radkov, System, method and program product for answering questions using a search engine.
  114. Chipman Richard R. ; Mankofsky Alan ; Karandikar Harshavardhan M.,DEX ; Warren Gary, System, method, and medium for retrieving, organizing, and utilizing networked data.
  115. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  116. Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
  117. Thompson Bruce A. (Highlands Ranch CO) Van Maren David J. (Ft. Collins CO) McCarthy John G. (Thornton CO) Purcell R. Andrew (Ft. Collins CO) Rottinghaus Michael (Greeley CO), Transparent peripheral file systems with on-board compression, decompression, and space management.
  118. Morris C. Carson (Broad Run VA) Bielsker Barry H. (Vienna VA) Cole Donald A. (Rockville MD), Two-tiered communication security employing asymmetric session keys.
  119. Peirce, Jr., Kenneth L.; Harper, Matthew; Mortsolf, Timothy G.; Xu, Yingchun; Dynarski, Richard J., Virtual home agent service using software-replicated home agents.

이 특허를 인용한 특허 (125)

  1. Bharadwaj, Vijay G; Bryce, Duncan G; Hamburg, Mike; Pandya, Ravindra N, Access control and encryption in multi-user systems.
  2. Dillaway, Blair B., Auditing authorization decisions.
  3. Dillaway, Blair B., Auditing authorization decisions.
  4. Hsieh, Jonathan Ming-Cyn, Automatic repair of corrupt HBases.
  5. Kornacker, Marcel; Erickson, Justin; Li, Nong; Kuff, Lenni; Robinson, Henry Noel; Choi, Alan; Behm, Alex, Background format optimization for enhanced SQL-like queries in Hadoop.
  6. Zeyliger, Philip; Langdale, Philip L.; Hunt, Patrick D., Centralized configuration and monitoring of a distributed computing cluster.
  7. Zeyliger, Philip; Langdale, Philip Lee; Hunt, Patrick David, Centralized configuration of a distributed computing cluster.
  8. Hsieh, Jonathan Ming-Cyn; Robinson, Henry Noel, Collecting and aggregating datasets for analysis.
  9. Hsieh, Jonathan Ming-Cyn; Robinson, Henry Noel, Collecting and aggregating log data with fault tolerance.
  10. Hsieh, Jonathan Ming-Cyn; Robinson, Henry Noel, Collecting and aggregating log data with fault tolerance.
  11. Hsieh, Jonathan Ming-Cyn; Robinson, Henry Noel, Collecting and aggregating log data with fault tolerance.
  12. Kobayashi,Ikuko; Kimura,Shinji, Computer system that enables a plurality of computers to share a storage device.
  13. Hsieh, Jonathan Ming-Cyn; Robinson, Henry Noel, Configuring a system to collect and aggregate datasets.
  14. Hsieh, Jonathan Ming-Cyn; Robinson, Henry Noel, Configuring a system to collect and aggregate datasets.
  15. Goyal, Sanyam; Chathoth, Vikas Pooven, Controlling access to a large number of electronic resources.
  16. Dillaway, Blair B.; Becker, Moritz Y.; Gordon, Andrew D.; Fournet, Cedric, Controlling the delegation of rights.
  17. Bharadwaj, Vijay G.; Ferguson, Niels T; Ellison, Carl M.; Nyström, Magnus Bo Gustaf; Zhou, Dayi; Issoupov, Denis; Ureche, Octavian T.; Novotney, Peter J.; Ilac, Cristian M., Cryptographic key management.
  18. Lipcon, Todd; Myers, Aaron T.; Collins, Eli, Data node fencing in a distributed file system.
  19. Tokutani, Takashi; Hatakeyama, Takahisa; Tanaka, Keishiro; Yura, Masakazu; Nagaoka, Teruyoshi, Data processing apparatus for digital copyrights management.
  20. Lipcon, Todd, Data processing performance enhancement in a distributed file system.
  21. Lipcon, Todd, Data processing performance enhancement in a distributed file system.
  22. Subramanian, Ananthan, Discarding sensitive data from persistent point-in-time image.
  23. Subramanian, Ananthan, Discarding sensitive data from persistent point-in-time image.
  24. Mizuno, Makio, Disk control unit.
  25. Mizuno,Makio, Disk control unit.
  26. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  27. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  28. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  29. Hsieh, Jonathan Ming-Cyn; Robinson, Henry Noel, Dynamically processing an event using an extensible data model.
  30. Hsieh, Jonathan Ming-Cyn; Robinson, Henry Noel, Dynamically processing an event using an extensible data model.
  31. Hsieh, Jonathan Ming-Cyn; Robinson, Henry Noel, Dynamically processing an event using an extensible data model.
  32. Alves, David; Lipcon, Todd, Ensuring properly ordered events in a distributed computing environment.
  33. Cross, David B.; Leach, Paul J., File system operation and digital rights management (DRM).
  34. Cross, David B.; Leach, Paul J., File system operation and digital rights management (DRM).
  35. Cross,David B.; Leach,Paul J., File system operation and digital rights management (DRM).
  36. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  37. Iyer, Pradeep, HTTP proxy based captive portal.
  38. Rossmann, Alain, Hybrid systems for securing digital assets.
  39. Sonwane, Abhilash Vijay; Mahadevia, Jimit Hareshkumau; Malek, Sarfaraz Mohammedhanif; Pandya, Sumit; Shah, Nishit Shantibhai; Modhwadiya, Rajesh Hardasbhai, Identity and policy-based network security and management system and method.
  40. Chateau,Alain; Azema,Jerome; Haidamous,Constantin, Indirect data protection using random key encryption.
  41. Kornacker, Marcel; Erickson, Justin; Li, Nong; Kuff, Lenni; Robinson, Henry Noel; Choi, Alan; Behm, Alex, Low latency query engine for Apache Hadoop.
  42. Kornacker, Marcel; Erickson, Justin; Li, Nong; Kuff, Lenni; Robinson, Henry Noel; Choi, Alan; Behm, Alex, Low latency query engine for apache hadoop.
  43. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  44. Hsieh, Jonathan Ming-Cyn; Bertozzi, Matteo, Manifest-based snapshots in distributed computing environments.
  45. Lipcon, Todd, Memory allocation buffer for reduction of heap fragmentation.
  46. Lipcon, Todd, Memory allocation buffer for reduction of heap fragmentation.
  47. Osaki,Nobuyuki, Method and apparatus for data storage.
  48. Gallant, David Austin; Ashmore, Paul Andrew, Method and apparatus for external event notification management over in-band and out-of-band networks in storage system controllers.
  49. Yadav,Satyendra, Method and apparatus for providing discrete data storage security.
  50. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  51. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  52. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  53. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  54. Phillips, Anthony H., Method and system for encrypted file access.
  55. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  56. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  57. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  58. Vainstein, Klimenty, Method and system for managing security tiers.
  59. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  60. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  61. Murray, Gregory L.; McClanahan, Craig R.; Burns, Edward J., Method and system for protecting publicly viewable web client reference to server resources and business logic.
  62. Nath, Satyajit, Method and system for providing document retention using cryptography.
  63. Nath, Satyajit, Method and system for providing document retention using cryptography.
  64. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  65. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  66. Elzur, Uri, Method and system for traffic engineering in secured networks.
  67. Elzur, Uri, Method and system for traffic engineering in secured networks.
  68. Elzur, Uri, Method and system for traffic engineering in secured networks.
  69. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  70. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  71. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  72. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  73. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  74. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  75. Lerner, Alexander; Dewey, Michael K., Method, system, and computer program product for facilitating communication in an interoperability network.
  76. Lerner, Alexander; Dewey, Michael K., Method, system, and computer program product for facilitating communication in an interoperability network.
  77. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  78. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  79. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  80. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  81. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  82. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  83. Roy, Paul; Al-Azzawe, Khalid; Carter, Cale; Chitnis, Ambarish; Hawes, Richard Masao, Network access control based on program state.
  84. Bojinov, Hristo; Subramanian, Ananthan, Network storage server with integrated encryption, compression and deduplication capability.
  85. Shelest, Art; Ward, Richard B., Network zones.
  86. Pope, Steve L.; Riddoch, David J.; Yu, Ching; Roberts, Derek, Packet validation in virtual network interface architecture.
  87. Pope, Steve L.; Riddoch, David J.; Yu, Ching; Roberts, Derek, Packet validation in virtual network interface architecture.
  88. Pope, Steve; Riddoch, David; Yu, Ching; Roberts, Derek, Packet validation in virtual network interface architecture.
  89. Chaudhary, Puneet; Gunda, Kalyan C.; Shah, Gautam Haridas, Per file system usage of networks.
  90. Jeffries, Charles G.; Bharadwaj, Vijay G.; Grass, Michael J.; Setzer, Matthew C.; Sinha, Gaurav; Ellison, Carl M., Portable secure data files.
  91. Jeffries, Charles G.; Bharadwaj, Vijay G.; Grass, Michael J.; Setzer, Matthew C.; Sinha, Gaurav; Ellison, Carl M., Portable secure data files.
  92. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  93. Gabrielson, Jacob; Hansen, Zachary J.; Lye, Diane N., Providing private access to network-accessible services.
  94. Gabrielson, Jacob; Hansen, Zachary J.; Lye, Diane N., Providing private access to network-accessible services.
  95. Zeyliger, Philip, Querying operating system state on multiple machines declaratively.
  96. Ranganathan, Jairam, Resource management in a distributed computing environment.
  97. Moore, Keith E.; Dekhil, Mohamed; Shenoy, Rajesh K., Secure access of resources at shared appliances.
  98. Garcia,Denis Jacques Paul, Secured data format for access control.
  99. Dillaway, Blair B.; Becker, Moritz Y.; Gordon, Andrew D.; Fournet, Cedric; LaMacchia, Brian A., Security assertion revocation.
  100. Dillaway, Blair B.; Becker, Moritz Y.; Gordon, Andrew D.; Fournet, Cedric, Security authorization queries.
  101. Dillaway, Blair B.; Becker, Moritz Y.; Gordon, Andrew D.; Fournet, Cedric, Security authorization queries.
  102. Becker, Moritz Y.; Dillaway, Blair B.; Fournet, Cedric; Gordon, Andrew D., Security language expressions for logic resolution.
  103. Becker, Moritz Y.; Dillaway, Blair B.; Fournet, Cedric; Gordon, Andrew D.; Mackay, Jason F., Security language translations with logic resolution.
  104. Becker, Moritz Y.; Dillaway, Blair B.; Fournet, Cedric; Gordon, Andrew D.; Mackay, Jason F., Security language translations with logic resolution.
  105. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  106. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  107. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  108. Beck, Stefan; Cherdron, Markus; Singler, Joerg, Session handling.
  109. Rajashekar, Rajesh; Klinkner, Steve, Simplified and unified management for network-attached storage.
  110. Kogelnik, Christoph, Sub-volume level security for deduplicated data.
  111. Garcia, Eduardo; Colorado, Carlos Arturo, System and method for communicating with a key management system.
  112. Garcia, Eduardo; Pena, Sergio A., System and method for controlling access to decrypted data.
  113. Camiel, Noam, System and method for data storage firewall on data storage unit.
  114. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  115. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  116. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  117. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  118. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  119. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  120. Kirkland, Dustin C.; Garcia, Eduardo, System and method for secure release of secret information over a network.
  121. Kirkland, Dustin C.; Garcia, Eduardo, System and method for secure release of secret information over a network.
  122. Chacko, Vinoo; Agarwal, Puneet; Nanjudaswamy, Shashi; Soni, Ajay, Systems and methods for enabling assured records using fine grained auditing of virtual private network traffic.
  123. Newton, Aaron; Zeyliger, Philip, User interface implementation for partial display update.
  124. Garcia, Eduardo, Virtual machine image encryption.
  125. Halcrow, Michael; Dierks, Timothy, Volatile encryption keys.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로