Search
Selected: All

Method and apparatus for establishing a security policy, and...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for evaluating assets for compliance to...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for generating a security document for...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for graph-based partition of...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for interfacing a network to an...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for managing and displaying contact...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for managing digital identities through...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for passing security configuration...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for preventing packet retransmissions...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for providing access to an identity...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for security policy and enforcing...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for supporting personal information...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus for trusted blade device computing

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus providing end to end protection for a...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and apparatus to protect policy state information...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and compiler for routing policy

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and mechanism for implementing synonym-based access...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for analyzing the security of a network

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for customizing a security policy

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Method and system for extending SELinux policy models and...

Information security – Policy
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.