Policy specification framework for insider intrusions
Policy-based security certificate filtering
Policy-based selection of remediation
Post data processing
Privacy markup on entity models
Privacy protection through restrictions on usernames and...
Protection of data accessible by a mobile device
Providing data to applications from an access system
Providing enterprise management of amorphous communities
Resource-reordered remediation of malware threats
Rights management inter-entity message policies and enforcement
Rights management inter-entity message policies and enforcement
Rule based security policy enforcement
Rule-driven specification of web service policy
Secure network and method of establishing communication...
Secure system and method for enforcement of privacy policy...
Secure system and method for enforcement of privacy policy...
Secure system and method for enforcement of privacy policy...
Secure system and method for enforcement of privacy policy...
Securely authorizing the performance of actions