Access-control permissions with inter-process message-based...
Access-request control method, driver program for...
Accessing a private network
Accessing in a rights locker system for digital content...
Accessing in a rights locker system for digital content...
Accessing network resources outside a security boundary
Accessing password protected devices
Accessing protected content in a rights-management architecture
Accessory authentication for electronic devices
Accomodating fragmentation with deterministic packet marking
Account synchronization for common identity in an unmanaged...
Achieving high assurance connectivity on computing devices...
Active intrusion resistant environment of layered object and...
Active network defense system and method
Active network defense system and method
Active reverse proxy system
Active verification of boot firmware
Adaptive multi-tier authentication system
Adaptive multi-tier authentication system
Adaptive security for portable information devices