| 11244253 |
Risk profiling for enterprise risk management |
Simon Foley |
2022-02-08 |
| 10248915 |
Risk profiling for enterprise risk management |
Simon Foley |
2019-04-02 |
| 9560080 |
Extending organizational boundaries throughout a cloud architecture |
Mustansir Banatwala, Robert L. Yates, Mary Ellen Zurko |
2017-01-31 |
| 9246839 |
Extending organizational boundaries throughout a cloud architecture |
Mustansir Banatwala, Robert L. Yates, Mary Ellen Zurko |
2016-01-26 |
| 9092787 |
Segmented questionnaire validation of business rules based on scoring |
— |
2015-07-28 |
| 9047488 |
Anonymizing sensitive identifying information based on relational context across a group |
Corville O. Allen, Scott R. Carrier, Eric Woods |
2015-06-02 |
| 8984593 |
Securing asynchronous client server transactions |
Steven A. Bade, Mary Ellen Zurko |
2015-03-17 |
| 8819787 |
Securing asynchronous client server transactions |
Steven A. Bade, Mary Ellen Zurko |
2014-08-26 |
| 8527633 |
Techniques for addressing geographical location issues in computing environments |
Steven A. Bade, Mary Ellen Zurko |
2013-09-03 |
| 8479268 |
Securing asynchronous client server transactions |
Steven A. Bade, Mary Ellen Zurko |
2013-07-02 |
| 8474019 |
Securing asynchronous client server transactions |
Steven A. Bade, Mary Ellen Zurko |
2013-06-25 |
| 7945467 |
Method for discerning and communicating organization's culture/posture towards business environment through segmented questionnaires |
— |
2011-05-17 |
| 7620729 |
Compliance initiative navigation |
— |
2009-11-17 |