Scoping of policies in a hierarchical customer service...
Seamless migration of one or more business processes and...
Search system, management server, mobile communication...
Secure content delivery system
Secure content delivery system
Secure content delivery system
Secure database management system for confidential records using
Secure distribution and use of weighted network topology...
Secure gateway having routing feature
Secure initialization of intrusion detection system
Secure initialization of intrusion detection system
Secure multiapplication proxy
Secure resource name resolution
Secure segregation of data of two or more domains or trust...
Secured and access controlled peer-to-peer resource sharing...
Securely persisting network resource identifiers
Securely persisting network resource identifiers
Securing an access provider
Security architecture for distributed processing systems and...
Security checking program for communication between networks