Search
Selected: All

Automated environmental policy awareness

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Automatic application of information protection policies

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Automatic derivation of access control policies from a...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Automatic generation of policies and roles for role based...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Behavior blocking access control

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Chaining information card selectors

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Charging via policy enforcement

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Client architecture for portable device with security policies

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Communication processing method and system relating to...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Communication system including a security system

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Computer network security system and method having...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Computer program products and systems for transparent data...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Computer security and management system

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Computer-readable recording medium storing access rights...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Configuration management database (CMDB) which establishes...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Controlling access to a resource by a program using a...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Controlling access to a set of resources in a network

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptographic peer discovery, authentication, and...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cryptographic peer discovery, authentication, and...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Data handling apparatus and methods

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.