| 8291474 |
Using opaque groups in a federated identity management environment |
Seth Proctor |
2012-10-16 |
| 8250526 |
Method for analyzing an XACML policy |
Seth Proctor |
2012-08-21 |
| 7478419 |
Automated policy constraint matching for computing resources |
Balasubramanian Devaraj |
2009-01-13 |
| 7213262 |
Method and system for proving membership in a nested group using chains of credentials |
Yassir K. Elley, Stephen R. Hanna, Sean J. Mullan, Radia J. Perlman |
2007-05-01 |
| 7085925 |
Trust ratings in group credentials |
Stephen R. Hanna, Yassir K. Elley, Radia J. Perlman, Sean J. Mullan |
2006-08-01 |
| 7058798 |
Method ans system for pro-active credential refreshing |
Yassir K. Elley, Stephen R. Hanna, Sean J. Mullan, Radia J. Perlman |
2006-06-06 |
| 7054905 |
Replacing an email attachment with an address specifying where the attachment is stored |
Stephen R. Hanna, David C. Douglas, Yassir K. Elley, Radia J. Perlman, Sean J. Mullan |
2006-05-30 |
| 7010690 |
Extensible system for building and evaluating credentials |
Stephen R. Hanna, Yassir K. Elley |
2006-03-07 |
| 6973569 |
Inexpensive secure on-line certification authority system and method |
Stephen R. Hanna |
2005-12-06 |
| 6883100 |
Method and system for dynamic issuance of group certificates |
Yassir K. Elley, Stephen R. Hanna, Sean J. Mullan, Radia J. Perlman |
2005-04-19 |
| 6801998 |
Method and apparatus for presenting anonymous group names |
Stephen R. Hanna, Yassir K. Elley, Radia J. Perlman, Sean J. Mullan |
2004-10-05 |
| 6263434 |
Signed group criteria |
Stephen R. Hanna, Yassir K. Elley, Radia J. Perlman, Sean J. Mullan |
2001-07-17 |
| 6035399 |
Checkpoint object |
Keith Klemba, Christopher J. Crall, Thomas A. Palmer, Joseph Pato, Gregory P. Carpenter |
2000-03-07 |