Search
Selected: M

Method and compiler for routing policy

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and mechanism for implementing synonym-based access...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for analyzing the security of a network

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for customizing a security policy

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for extending SELinux policy models and...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for implementing authorization policies...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for managing security policies for...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for merging security policies

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for mitigating distributed denial of...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for providing terminal view access of a...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for resource based authentication

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for securing a remote file system

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for securing execution of untrusted...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method for automatically managing information privacy

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method for controlling access to a target application

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method for device security in a heterogeneous storage...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method for dynamic application of rights management policy

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method of enforcing a policy on a computer network

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method of updating intrusion detection rules through link...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method, apparatus, and computer program for managing access...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.