| 8584195 |
Identities correlation infrastructure for passive network monitoring |
Kieran Gerard Sherlock, Geoffrey Cooper, John Richard Guzik, Derek Patton Pearcy |
2013-11-12 |
| 8074256 |
Pdstudio design system and method |
John Richard Guzik, Derek Patton Pearcy |
2011-12-06 |
| 7631188 |
Hierarchical open security information delegation and acquisition |
— |
2009-12-08 |
| 7478422 |
Declarative language for specifying a security policy |
Geoffrey Cooper, Robert Shaw, Kieran Gerard Sherlock |
2009-01-13 |
| 7451488 |
Policy-based vulnerability assessment |
Geoffrey Cooper, Derek Patton Pearcy, Harry Richardson |
2008-11-11 |
| 7272646 |
Network monitor internals description |
Geoffrey Cooper, Robert Shaw, Kieran Gerard Sherlock |
2007-09-18 |
| 7246370 |
PDstudio design system and method |
John Richard Guzik, Derek Patton Pearcy |
2007-07-17 |
| 7143439 |
Efficient evaluation of rules |
Geoffrey Cooper, Kieran Gerard Sherlock, Bob Shaw |
2006-11-28 |
| 7047288 |
Automated generation of an english language representation of a formal network security policy specification |
Geoffrey Cooper, Kieran Gerard Sherlock, Bob Shaw |
2006-05-16 |
| 6871284 |
Credential/condition assertion verification optimization |
Geoffrey Cooper, Kieran Gerard Sherlock, Bob Shaw |
2005-03-22 |
| 6779120 |
Declarative language for specifying a security policy |
Geoffrey Cooper, Robert Shaw, Kieran Gerard Sherlock |
2004-08-17 |
| 6513116 |
Security information acquisition |
— |
2003-01-28 |