| 9038168 |
Controlling resource access based on resource properties |
Nir Ben-Zvi, Raja Pazhanivel Perumal, Anders Samuelsson, Ran Kalach, Ziquan Li +3 more |
2015-05-19 |
| 8984624 |
Resource access based on multiple scope levels |
Raja Pazhanivel Perumal, Paul J. Leach |
2015-03-17 |
| 8775734 |
Virtual disks constructed from unused distributed storage |
Saurabh Gupta, Justin Neddo, Joseph M. Sherman |
2014-07-08 |
| 8646044 |
Mandatory integrity control |
Richard B. Ward, Peter T. Brundrett |
2014-02-04 |
| 8464319 |
Resource access based on multiple scope levels |
Raja Pazhanivel Perumal, Paul J. Leach |
2013-06-11 |
| 8347085 |
Integrating security protection tools with computer device integrity and privacy policy |
Thekkthalackal Varugis Kurien, Narasimha Rao S. S. Nagampalli, Peter T. Brundrett, Scott A. Field |
2013-01-01 |
| 8117441 |
Integrating security protection tools with computer device integrity and privacy policy |
Thekkthalackal Varugis Kurien, Narasimha Rao S. S. Nagampalli, Peter T. Brundrett, Scott A. Field |
2012-02-14 |
| 7636851 |
Providing user on computer operating system with full privileges token and limited privileges token |
Jonathan Schwartz, Kedarnath A. Dubhashi, Klaus Schutz, Peter T. Brundrett, Richard B. Ward +1 more |
2009-12-22 |
| 7434257 |
System and methods for providing dynamic authorization in a computer system |
Praerit Garg, Robert P. Reichel, Richard B. Ward, Kedarnath A. Dubhashi, Anne Chace Hopkins |
2008-10-07 |
| 7248691 |
Hashing using multiple sub-hashes |
Bhalchandra Pandit, Robert P. Reichel, Kedarnath A. Dubhashi |
2007-07-24 |
| 7096367 |
System and methods for caching in connection with authorization in a computer system |
Praerit Garg, Robert P. Reichel, Richard B. Ward, Kedarnath A. Dubhashi, Anne Chace Hopkins |
2006-08-22 |