1
Kay Schwendimann Anderson, Pau Chen Cheng, Trenton Ray Jaeger, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Schuett Reninger, Grant Wagner: System and method for security planning with soft security constraints. International Business Machines Corporation, William J Stock, F Chau & Associates, March 6, 2012: US08132259 (3 worldwide citation)

A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at le ...


2
Kay Schwendimann Anderson, Pau Chen Cheng, Genady Ya Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner: System and method for security planning with hard security constraints. International Business Machines Corporation, F Chau & Associates, September 25, 2012: US08276192 (2 worldwide citation)

A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard se ...


3
Weifeng Chen, Alexandre V Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner: Access control method and a system for privacy protection. International Business Machines Corporation, William J Stock Esq, F Chau & Associates, October 4, 2011: US08032924

A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first chan ...


4
Weifeng Chen, Alexandre V Evfunievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner: Access control method and a system for privacy protection. International Business Machines Corporation, William J Stock Esq, F Chau & Associates, September 13, 2011: US08020213

A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first chan ...


5
Hanhua Feng, Anton Viktorovich Riabov: Pull data transfer method in request-response models. International Business Machines Corporation, Ference & Associates, February 16, 2016: US09264506

Systems, methods, and products for pull data transfer in a request-response model are provided herein. One aspect provides for generating output data utilizing at least one data generation station; and communicating via the at least one data generation station output data related to at least one dat ...


6
Kay Schwendimann Anderson, Genady Ya Grabarnik, Nagui Halim, Zhen Liu, Anton Viktorovich Riabov: Apparatus and method of planning through generation of multiple efficient plans. F Chau & Associates, March 20, 2008: US20080071716-A1

A method and apparatus for solving a planning problem generates multiple efficient, alternate plans, one of which is selected for execution. Cost and quality metrics are used for describing and comparing the multiple plans. A planner narrows down a large number of possible solutions or plans to solv ...


7
Weifeng Chen, Alexandre V Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner: Access control method and a system for privacy protection. F Chau & Associates, February 7, 2008: US20080034439-A1

A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first chan ...


8
Kay Schwendimann Anderson, Pau Chen Cheng, Genady Ya Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner: System and method for security planning with hard security constraints. International Business Machines Corporation, F Chau & Associates, January 17, 2008: US20080016547-A1

A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard se ...


9
Kay Schwendimann Anderson, Pau Chen Cheng, Trenton Ray Jaeger, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Schuett Reninger, Grant Wagner: System and method for security planning with soft security constraints. Frank Chau Esq, F Chau & Associates, July 10, 2008: US20080168529-A1

A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at le ...


10
Weifeng Chen, Alexandre V Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner: Access control method and a system for privacy protection. F Chau & Associates, March 5, 2009: US20090064343-A1

A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first chan ...