Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David G. Kuehr-McLaren is active.

Publication


Featured researches published by David G. Kuehr-McLaren.


Archive | 1998

Extending SSL to a multi-tier environment using delegation of authentication and authority

Mark Charles Davis; David G. Kuehr-McLaren; Timothy Shoriak


Archive | 1998

Systems, methods and computer program products for authenticating client requests with client certificate information

Mark Charles Davis; Steve D. Gray; David G. Kuehr-McLaren; Ian Morrison; Timothy Shoriak


Archive | 1999

Methods, systems and computer program products for enhanced security identity utilizing an SSL proxy

Michael E. Baskey; Timothy J. Hahn; Dilip D. Kandlur; David G. Kuehr-McLaren


Archive | 1997

Systems, methods and computer program products that use an encrypted session for additional password verification

Mark Charles Davis; David G. Kuehr-McLaren; Calvin S. Powers


Archive | 2003

Automated role discovery

Pratik Gupta; Govindaraj Sampathkumar; David G. Kuehr-McLaren; Vincent C. Williams; Sharon L. Cutcher; Sumit Taank; Brian A. Stube; Hari Shankar


Archive | 2007

Automatic Policy Generation Based on Role Entitlements and Identity Attributes

David G. Kuehr-McLaren; Pratik Gupta; Govindaraj Sampathkumar; Vincent C. Williams; Sharon L. Cutcher; Sumit Taank; Brian A. Stube; Hari Shankar


Archive | 2003

Methods, systems, and computer program products that centrally manage password policies

Luis Benicio Casco-arias; Pratik Gupta; David G. Kuehr-McLaren; Andrew David Record


Archive | 2007

Method and Apparatus for Creating Custom Access Control Hierarchies

David G. Kuehr-McLaren; Kwabena Mireku; Govindaraj Sampathkumar; Janette Wong


Archive | 2007

SECURE SHARING OF TRANSPORT LAYER SECURITY SESSION KEYS WITH TRUSTED ENFORCEMENT POINTS

David G. Kuehr-McLaren; Linwood H. Overby


Archive | 2001

Methods, systems and computer program products for secure delegation using public key authentication

John Ryan McGarvey; David G. Kuehr-McLaren

Researchain Logo
Decentralizing Knowledge