Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shannon J. Chan is active.

Publication


Featured researches published by Shannon J. Chan.


symposium on access control models and technologies | 2001

Improving the granularity of access control in Windows NT

Michael M. Swift; Peter T. Brundrett; Cliff Van Dyke; Praerit Garg; Anne Hopkins; Shannon J. Chan; Mario C. Goertzel; Gregory Jensenworth

This paper presents the access control mechanisms in Windows 2000 that enable fine-grained protection and centralized management. These mechanisms were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000. We first extended entries in access control lists to allow rights to apply to just a portion of an object. The second extension allows centralized management of object hierarchies by specifying more precisely how access control lists are inherited. The final extension allows users to limit the rights of executing programs by restricting the set of objects they may access. These changes have the combined effect of allowing centralized management of access control while precisely specifying which accesses are granted to which programs.


Archive | 1998

Method and system for secure running of untrusted content

Shannon J. Chan; Gregory Jensenworth; Mario C. Goertzel; Bharat Shah; Michael M. Swift; Richard B. Ward


Archive | 1995

Method and system for network marshalling of interface pointers for remote procedure calls

Richard D. Hill; Antony S. Williams; Robert G. Atkinson; Tom Corbett; Paul J. Leach; Shannon J. Chan; Alexander A. Mitchell; Edward K. Jung; Craig Wittenberg


Archive | 2002

Methods and apparatuses for sharing media content, libraries and playlists

Tarek Z. Elabbady; Shannon J. Chan; James M. Alkove; Sandeep Sahasrabudhe


Archive | 2002

Method and system for on-demand installation of software implementations

Debi P. Mishra; David E. Kays; Markus Horstmann; Mark H. Lucovsky; Shannon J. Chan; Bharat Shah; Gregory Jensenworth


Archive | 1998

Security model using restricted tokens

Gregory Jensenworth; Praerit Garg; Michael M. Swift; Mario C. Goertzel; Shannon J. Chan


Archive | 2004

Simple and dynamic configuration of network devices

Dale A. Sather; Guillaume Simonnet; John M. Gehlsen; Kosar Jaff; Ralph A. Lipe; Roland J. Ayala; Shannon J. Chan; Thomas W. Kuehnel


Archive | 2007

Mechanism to convey discovery information in a wireless network

Thomas W. Kuehnel; Amer A. Hassan; David Jones; Savas Guven; Shannon J. Chan; Srinivas Raghu Gatta


Archive | 2004

Secure network channel

Thomas W. Kuehnel; Shannon J. Chan


Archive | 2010

Two-way authentication using a combined code

Shannon J. Chan; Thomas W. Kuehnel

Collaboration


Dive into the Shannon J. Chan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael M. Swift

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge