1
Philip B Griffin, Manish Devgan, Alex Toussaint, Rod McCauley: Method for role and resource policy management. BEA Systems, Fliesler Meyer, July 12, 2005: US06917975 (46 worldwide citation)

A method for adaptively managing entitlements, comprising the steps of providing for the association of a role with a first resource; and providing for the association of a policy with a second resource, wherein the policy is based at least partially on the role; and providing for hierarchically rel ...


2
Philip B Griffin, Manish Devgan, Alex Toussaint, Rod McCauley: Method for role and resource policy management optimization. BEA Systems, Townsend and Townsend and Crew, January 26, 2010: US07653930 (16 worldwide citation)

Methods are disclosed for authorization to adaptively control access to a resource in a resource hierarchy. At least one role for a principal is retrieved from the resource hierarchy or a first cache based on whether the at east one role was previously retrieved from the resource hierarchy. A policy ...


3
Philip B Griffin, Manish Devgan, Alex Toussaint, Rod McCauley: System and method for hierarchical role-based entitlements. Oracle International Corporation, Townsend and Townsend and Crew, September 15, 2009: US07591000 (8 worldwide citation)

A system and method for authorization to adaptively control access to a resource, comprising the steps of providing for the mapping of a principal to at least one role, wherein the at least one role is hierarchically related to the resource; providing for the evaluation of a policy based on the at l ...


4
Philip B Griffin, Manish Devgan, Alex Toussaint, Rod McCauley: System and method for hierarchical role-based entitlements. Oracle International Corporation, Kilpatrick Townsend & Stockton, August 2, 2011: US07992189 (5 worldwide citation)

A system and method for authorization to adaptively control access to a resource, comprising the steps of providing for the mapping of a principal to at least one role, wherein the at least one role is hierarchically related to the resource; providing for the evaluation of a policy based on the at l ...


5
Alex Toussaint, David P Meyer, Diego Sabaris, Eduardo Chiocconi, Eduardo Carlos Rubio, Emilio Lopez Gabeiras, Hans Sussenburger, Pablo Alvarez, Paulo Gustavo Veiga, Jorge Aliss, Guillermo Roldos: Business process management (BPM) add-in for office software. ORACLE INTERNATIONAL CORPORATION, Tucker Ellis, September 8, 2015: US09129255 (1 worldwide citation)

One embodiment of the present invention comprises a plug-in for an office software product. The plug-in can allow for the creation of a Business Process Management (BPM) instance that can be related to an open document in the office software product. The Business Process Management instance can be l ...


6
Philip B Griffin, Manish Devgan, Alex Toussaint, Rod McCauley: Method for delegated administration. Oracle International Corporation, Kilpatrick Townsend & Stockton, September 9, 2014: US08831966

A method for adaptively delegating a capability, comprising the steps of providing for the delegation of the capability to a first role; allowing the step of providing for the delegation to be initiated by a principal in a second role; and hierarchically relating the capability, the first role and t ...


7
Alex Toussaint, Chris Jolley, Jay Hurst, Stephen L Pepper, Kari L Hotchkiss, Saptarshi Roy: Cross domain in-browser proxy. salesforce com, Blakely Sokoloff Taylor & Zafman, November 22, 2016: US09503501

An in-browser proxy enables an application in a frame to make a cross domain request. The proxy executes within the browser, which has a first domain. The browser provides a frame in which a client application executes, which has a second domain. The request from the client application is a request ...


8
Alex Toussaint, Chris Jolley, Jay Hurst, Stephen L Pepper, Kari L Hotchkiss, Saptarshi Roy: Cross domain in-browser proxy. salesforce com, Elliott Ostrander & Preston P C, September 18, 2018: US10079905

An in-browser proxy enables an application in a frame to make a cross domain request. The proxy executes within the browser, which has a first domain. The browser provides a frame in which a client application executes, which has a second domain. The request from the client application is a request ...


9
Philip B Griffin, Manish Devgan, Alex Toussaint, Rod McCauley: Method for role and resource policy management optimization. Sheldon R Meyer, Fliesler Dubb Meyer & Lovejoy, August 19, 2004: US20040162905-A1

A method for authorization to adaptively control access to a resource, comprising the steps of: retrieving at least one role for a principal from one of: 1) a first hierarchy; and 2) a first cache; retrieving a policy from one of: 1) a second hierarchy; and 2) a second cache; providing for the evalu ...


10
Philip B Griffin, Manish Devgan, Alex Toussaint, Rod McCauley: System and method for hierarchical role-based entitlements. Sheldon R Meyer, Fliesler Dubb Meyer & Lovejoy, August 19, 2004: US20040162906-A1

A system and method for authorization to adaptively control access to a resource, comprising the steps of providing for the mapping of a principal to at least one role, wherein the at least one role is hierarchically related to the resource; providing for the evaluation of a policy based on the at l ...