Policy specification framework for insider intrusions
Policy store
Policy-based network security management
Policy-based security certificate filtering
Policy-based selection of remediation
Policy-based vulnerability assessment
Portable authentication and access control involving...
Portable authorization device for authorizing use of...
Portable computer system with hierarchical and token-based...
Portable computing system docking security system and method
Portable consumer device configured to generate dynamic...
Portable device and a method for accessing a computer...
Portable device and a method for accessing a computer...
Portable device for accessing host computer via remote computer
Portable device having biometrics-based authentication...
Portable information processing device having data...
Portable information terminal, and electronic information...
Portable network encryption keys
Portable network encryption keys
Portable program for generating attacks on communication...