| 10511484 |
Membership self-discovery in distributed computing environments |
Wei Yu, Dmytro Ivashchenko, Qihui Li, Nengwu Zhu, Bhavesh Anil Doshi +4 more |
2019-12-17 |
| 10467191 |
Large scale data join service within a service provider network |
Wei Yu, Nengwu Zhu, Qihui Lee |
2019-11-05 |
| 9530012 |
Processing extensible markup language security messages using delta parsing technology |
Satoshi Makino, Masayoshi Teraguchi, Kenichiro Ueno |
2016-12-27 |
| 8943319 |
Managing security for computer services |
John Y. Chang, Ching-Yun Chao |
2015-01-27 |
| 8924723 |
Managing security for computer services |
John Y. Chang, Ching-Yun Chao |
2014-12-30 |
| 8375211 |
Optimization of signing soap body element |
Takahide Nogayama, Gregory L. Truty, Kenichiro Ueno |
2013-02-12 |
| 8060917 |
System and method for hosting multiple kerberos service principal names |
Derek Ho, David L. Leigh, Michael J. McMahon, Rengan Sundararaman |
2011-11-15 |
| 7934252 |
Filtering technique for processing security measures in web service messages |
Takahide Nogayama, Toshiro Takase, Kenichiro Ueno |
2011-04-26 |
| 7925881 |
Method and apparatus for preventing rogue implementations of a security-sensitive class interface |
Peter Daniel Birk, Ching-Yun Chao |
2011-04-12 |
| 7822206 |
Systems and methods for management and auto-generation of encryption keys |
Peter Daniel Birk, Keys D. Botzum, Ching-Yun Chao, Alaine DeMyers, Ut Van Lee +2 more |
2010-10-26 |
| 7810132 |
Application server object-level security for distributed computing domains |
Peter Daniel Birk, Ching-Yun Chao, Carlton Keith Mason, Ajaykumar Karkala Reddy, Vishwanath Venkataramappa |
2010-10-05 |
| 7765585 |
Credential delegation using identity assertion |
Ching-Yun Chao, Ajay Reddy, Vishwanath Venkataramappa |
2010-07-27 |
| 7752452 |
Dynamic cache lookup based on dynamic data |
Peter Daniel Birk, Ching-Yun Chao |
2010-07-06 |
| 7734918 |
Preventing rogue implementations of a security-sensitive class interface |
Peter Daniel Birk, Ching-Yun Chao |
2010-06-08 |
| 7634803 |
Method and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework |
Peter Daniel Birk, Ching-Yun Chao |
2009-12-15 |
| 7526798 |
System and method for credential delegation using identity assertion |
Ching-Yun Chao, Ajay Reddy, Vishwanath Venkataramappa |
2009-04-28 |
| 7526799 |
Method for tracking security attributes along invocation chain using secure propagation token |
Peter Daniel Birk, Keys D. Botzum, Ching-Yun Chao |
2009-04-28 |
| 7487361 |
Dynamic cache lookup based on dynamic data |
Peter Daniel Birk, Ching-Yun Chao |
2009-02-03 |
| 7448066 |
Application server object-level security for distributed computing domains |
Peter Daniel Birk, Ching-Yun Chao, Carlton Keith Mason, Ajaykumar Karkala Reddy, Vishwanath Venkataramappa |
2008-11-04 |
| 7337318 |
Method and apparatus for preventing rogue implementations of a security-sensitive class interface |
Peter Daniel Birk, Ching-Yun Chao |
2008-02-26 |
| 6950825 |
Fine grained role-based access to system resources |
David Yu Chang, Ching-Yun Chao, Carlton Keith Mason, Vishwanath Venkataramappa, Leigh Williamson |
2005-09-27 |