| 11386221 |
Fine-grained access control for data manipulation language (DML) operations on relational data |
Tanvir Ahmed, Yi Ru, Chao Liang |
2022-07-12 |
| 10303894 |
Fine-grained access control for data manipulation language (DML) operations on relational data |
Tanvir Ahmed, Yi Ru, Chao Liang |
2019-05-28 |
| 10268705 |
Identifying unused privileges in a database system |
Chi Ching Chui |
2019-04-23 |
| 10102355 |
Optimized enforcement of fine grained access control on data |
Tanvir Ahmed, Yi Ru, Chao Liang |
2018-10-16 |
| 10049205 |
Asserting identities of application users in a database system based on delegated trust |
Tanvir Ahmed, Thomas Keefe |
2018-08-14 |
| 9886590 |
Techniques for enforcing application environment based security policies using role based access control |
Janaki Narasinghanallur, Min-Hank Ho, Thomas Keefe, Eric Sedlar, Chi Ching Chui |
2018-02-06 |
| 9613224 |
Integrating a user's security context in a database for access control |
Mincai Wang, Chao Liang, Tanvir Ahmed |
2017-04-04 |
| 9495394 |
Pluggable session context |
Janaki Narasinghanallur, Min-Hank Ho, Eric Sedlar, Thomas Keefe, Chon Hei Lei |
2016-11-15 |
| 9477671 |
System and method for implementing effective date constraints in a role hierarchy |
Rafae Bhatti, Janaki Narasinghanallur, Thomas Keefe |
2016-10-25 |
| 9471801 |
Method and apparatus to support privileges at multiple levels of authentication using a constraining ACL |
Sam Idicula, Thomas Keefe, Mohammed Irfan Rafiq, Tanvir Ahmed, Nipun Agarwal |
2016-10-18 |
| 9043309 |
SQL transformation-based optimization techniques for enforcement of data access control |
Tanvir Ahmed, Thomas Keefe, Chao Liang |
2015-05-26 |
| 8732847 |
Access control model of function privileges for enterprise-wide applications |
Thomas Keefe, Tanvir Ahmed, Roger Wigenstam |
2014-05-20 |
| 8667018 |
Method and system for optimizing row level security in database systems |
Mohammed Irfan Rafiq, Chon Hei Lei, Vikram Kapoor, Thomas Keefe, Nipun Agarwal +2 more |
2014-03-04 |
| 8549038 |
Pluggable session context |
Janaki Narasinghanallur, Min-Hank Ho, Eric Sedlar, Thomas Keefe, Chon Hei Lei |
2013-10-01 |
| 8316051 |
Techniques for adding multiple security policies to a database system |
Rae K. Burns, Patrick F. Sack |
2012-11-20 |
| 8095557 |
Type system for access control lists |
Tanvir Ahmed, Thomas Keefee, Eric Sedlar |
2012-01-10 |
| 7657925 |
Method and system for managing security policies for databases in a distributed system |
Srividya Tata, Shiu Kau Wong |
2010-02-02 |