Hotspot


Archive | 2004

Managing digital identity information

Joseph Andrew Mellmer; Russell T. Young; Arn D. Perkins; John M. Robertson; Jeffrey Neil Sabin; Michael C. McDonald; Douglas Phillips; Robert Michael Sheridan; Nadeem A. Nazeer; Deeanne Higley; Stephen R. Carter; Douglas G. Earl; Kelly Sonderegger; Daniel T. Ferguson; Farrell Lynn Brough


Archive | 2010

Techniques for secure access management in virtual environments

Lloyd Leon Burch; Prakash Umasankar Mukkara; Douglas G. Earl


Archive | 1998

Client inherited functionally derived from a proxy topology where each proxy is independently configured

Douglas G. Earl; Cory R. Newey


Archive | 2007

Techniques for dynamically establishing and managing authentication and trust relationships

Lloyd Leon Burch; Douglas G. Earl; Stephen R. Carter; Robert Mark Ward


Archive | 2004

Techniques for establishing and managing a distributed credential store

Lloyd Leon Burch; Douglas G. Earl; Stephen R. Carter


Archive | 2004

Allocation of network resources

Tammy Anita Green; Lloyd Leon Burch; Stephen R. Carter; Douglas G. Earl


Archive | 2009

Techniques for virtual representational state transfer (rest) interfaces

Lloyd Leon Burch; Douglas G. Earl; Jonathan Paul Bultmeyer; Carolyn B. McClain


Archive | 2010

Dynamic service access

Lloyd Leon Burch; Prakash Umasankar Mukkara; Douglas G. Earl


Archive | 2011

Techniques for non repudiation of storage in cloud or shared storage environments

Prakash Umasankar Mukkara; Lloyd Leon Burch; Douglas G. Earl


Archive | 2010

MULTIPLE ACCESS AUTHENTICATION

Lloyd Leon Burch; Douglas G. Earl

Researchain Logo
Decentralizing Knowledge