Cascading security architecture
Centralized enforcement of name-based computer system...
Certificate based digital rights management
Character information generating apparatus and method,...
Client security for networked applications
Cloaked data objects in an electronic content management...
Cloud-based application whitelisting
Combining communication policies into common rules store
Command processing system by a management agent
Command processing system by a management agent
Command processing system by a management agent
Communication device
Communication system and its method and communication...
Compliance processing of rights managed data
Compliance validator for restricted network access control
Computer implemented method and system for controlling use...
Computer network storage environment hostile to...
Computer security system
Computer system
Computer system for judging whether to permit use of data...