System and method for incrementally distributing a security policy in a computer network

MS Moriconi, S Godik, M Xu, K Yagen - US Patent 7,363,650, 2008 - Google Patents
Feb. 12, 1999, now Pat. No. 6,158,010, said applica-application guard uses the distributed
change to update the tion No. 10/017.368 is a continuation-in-part of appli-currently …

Distributed enterprise security system

P Patrick, D Byrne, KD Yagen, M Xu, J Howes… - US Patent …, 2009 - Google Patents
US PATENT DOCUMENTS 6,202,207 B1 3/2001 Donohue 6,209,101 B1 3/2001 Mitchem et
al. 5,577,209 A 1 1/1996 Boyle et al. 6,216,231 B1 4/2001 Stubblebine 5,619,710 A 4, 1997 …

Adaptive trust negotiation and access control

T Ryutov, L Zhou, C Neuman, T Leithead… - Proceedings of the …, 2005 - dl.acm.org
Electronic transactions regularly occur between business partners in separate security
domains. Trust negotiation is an approach that provides an open authentication and access …

A Systematic Mapping Study on Intrusion Response Systems

A Rezapour, M GhasemiGol, D Takabi - IEEE Access, 2024 - ieeexplore.ieee.org
With the increasing frequency and sophistication of network attacks, network administrators
are facing tremendous challenges in making fast and optimum decisions during critical …

Security data redaction

PB Patrick, N Gupta - US Patent 8,086,615, 2011 - Google Patents
5,481,700 A 1/1996 Thuraisingham 5,544,355 A 8, 1996 Chaudhuri et al. 5,701,453 A
12/1997 Maloney et al. 5,764,973 A 6, 1998 Lunceford 5,797,128 A 8, 1998 Birnbaum …

System and method for maintaining security in a distributed computer network

M Moriconi, S Qian - US Patent 7,506,357, 2009 - Google Patents
See application file for complete search histo s on a server for managing and distributing a
security policy, pp p ry. and an application guard located on a client for managing (56) …

Incident handling systems with automated intrusion response

N Herold - 2017 - mediatum.ub.tum.de
Incident handling, consisting of intrusion detection, alert processing and intrusion response,
increases the resilience of IT systems under attack. Instead of providing a holistic solution …

Adaptive trust negotiation and access control for grids

T Ryutov, L Zhou, C Neuman, N Foukia… - The 6th IEEE/ACM …, 2005 - ieeexplore.ieee.org
Access control in computational grids is typically provided by a combination of identity
certificates and local accounts. This approach does not scale as the number of users and …

Liquid data services

N Gupta - US Patent 7,778,998, 2010 - Google Patents
5,544,355 A* 8/1996 Chaudhuri et al.............. 707/2 5,701,453 A 12/1997 Maloney et al.
5,764,973 A 6, 1998 Lunceford 5,802,518 A 9, 1998 Karaev et al. 5,940,289 A 8, 1999 Iwata …

[图书][B] A framework for cost-sensitive automated selection of intrusion response

CR Strasburg - 2009 - search.proquest.com
In recent years, cost-sensitive intrusion response has gained significant interest due to its
emphasis on the balance between potential damage incurred by the intrusion and cost of …