| 8224940 |
Strategies for compressing information using bloom filters |
Yikang Xu, John T. Spivey, John Steven Holmes |
2012-07-17 |
| 8005901 |
Mapping policies to messages |
Keith W. Ballinger, Hervey O. Wilson |
2011-08-23 |
| 7730138 |
Policy processing model |
Keith W. Ballinger, Hervey O. Wilson |
2010-06-01 |
| 7665120 |
Visual summary of a web service policy document |
Govindaraj Ramanathan, Hervey O. Wilson, Keith W. Ballinger |
2010-02-16 |
| 7661124 |
Rule-driven specification of web service policy |
Govindaraj Ramanathan, Hervey O. Wilson, Keith W. Ballinger |
2010-02-09 |
| 7657932 |
Extendible security token management architecture and secure message handling methods |
Keith W. Ballinger, HongMei Ge, Hervey O. Wilson |
2010-02-02 |
| 7533264 |
Custom security tokens |
Keith W. Ballinger, HongMei Ge, Hervey O. Wilson |
2009-05-12 |
| 7533265 |
Establishment of security context |
Keith W. Ballinger, HongMei Ge, Hervey O. Wilson |
2009-05-12 |
| 7434252 |
Role-based authorization of network services using diversified security tokens |
Keith W. Ballinger, HongMei Ge, Hervey O. Wilson |
2008-10-07 |