1
Robert V Meushaw, Mark S Schneider, Donald N Simard, Grant M Wagner: Device for and method of secure computing using virtual machines. The United States of America represented by the National Security Agency, Robert D Morelli, July 26, 2005: US06922774 (118 worldwide citation)

A device for and method of secure computing that includes a computer system having a processor; an operating-system software program loaded onto the processor; a type-II virtual machine monitor software program loaded onto the operating-system software program; a user-definable number of non-sensiti ...


2
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: System and method for fuzzy multi-level security. International Business Machines Corporation, Keusey Tutunjian & Bitetto P C, Joseph Jones, May 5, 2009: US07530110 (10 worldwide citation)

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


3
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Fuzzy multi-level security. International Business Machines Corporation, Tutunjian & Bitetto P C, Preston J Young Esq, December 27, 2011: US08087090 (6 worldwide citation)

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


4
Kay S Anderson, Pau Chen Cheng, Mark D Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Method of managing and mitigating security risks through planning. International Business Machines Corporation, Chau & Associates, November 9, 2010: US07832007 (2 worldwide citation)

An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage p ...


5
Kay S Anderson, Pau Chen Cheng, Mark D Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Method of managing and mitigating security risks through planning. International Business Machines Corporation, F Chau & Associates, January 17, 2012: US08099781 (1 worldwide citation)

An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage p ...


6
Kay W Anderson, Pau Chen Cheng, Mark D Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Method of managing and mitigating security risks through planning. International Business Machines Corporation, Frank Chau Esq, F Chau & Associates, July 12, 2007: US20070162976-A1

An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage p ...


7
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: System and method for fuzzy multi-level security. Keusey Tutunjian & Bitetto PC, October 23, 2008: US20080263662-A1

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


8
Robert V Meushaw, Mark S Schneider, Donald N Simard, Grant M Wagner: Device for and method of secure computing using virtual machines. Office Of The Assoc Gen Counsel, November 14, 2002: US20020169987-A1

A device for and method of secure computing that includes a computer system having a processor; an operating-system software program loaded onto the processor; a type-II virtual machine monitor software program loaded onto the operating-system software program; a user-definable number of non-sensiti ...


9
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: System and method for fuzzy multi-level security. Keusey Tutunjian & Bitetto PC, November 9, 2006: US20060253709-A1

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


10
Kay S Anderson, Pau Chen Cheng, Mark D Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Method of Managing and Mitigating Security Risks Through Planning. International Business Machines Corporation, F Chau & Associates, November 12, 2009: US20090282487-A1

An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage p ...