1
Cheuk W Ko, Jaisook Rho: Method and apparatus for providing a policy-driven intrusion detection system. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, September 7, 2004: US06789202 (190 worldwide citation)

One embodiment of the present invention provides a providing policy-driven intrusion detection system for a networked computer system. This system operates by receiving a global policy for intrusion detection for the networked computer system. This global policy specifies rules in the form of a glob ...


2
Richard J Feiertag, Roshan Thomas, Jaisook Rho, Eve L Cohen, Sebastien T Rosset, Timothy Redmond: System, method and computer program product for secure communications using a security service provider manager. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, June 29, 2004: US06757822 (60 worldwide citation)

A system, method and computer program product are provided for managing the use of a plurality of security service providers during network communication. A first security service provider is utilized for affording secure communication between applications using a network. During operation, the syst ...


3
Lee Benzinger, Richard J Feiertag, Jaisook Rho: System, method and computer program product for dynamic system adaptation using contracts. McAfee, Zilka Kotab PC, Christopher J Hamaty, September 16, 2008: US07426551 (15 worldwide citation)

A system, method and computer program product are provided for dynamic adaptation of a system in accordance with a contract with criteria associated therewith. During operation, an interaction between a plurality of components of a system is governed utilizing the criteria of the contract. Further, ...


4
Victor Henry Shear, Peter Robert Williams, Jaisook Rho, Timothy St John Redmond: Methods and systems for secure and reliable identity-based computing. Advanced Elemental Technologies, Finnegan Henderson Farabow Garrett & Dunner, August 1, 2017: US09721086 (4 worldwide citation)

The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement r ...


5

6

7
Victor Henry Shear, Peter Robert Williams, Jaisook Rho, Timothy St John Redmond, James Jay Horning: Purposeful computing. Advanced Elemental Technologies, Finnegan Henderson Farabow Garrett & Dunner, September 11, 2018: US10075384

A system, method, and computer-readable storage medium configured to facilitate user purpose in a computing architecture.


8
Victor Henry Shear, Peter Robert Williams, Jaisook Rho, Timothy St John Redmond: Methods and systems for secure and reliable identity-based computing. Advanced Elemental Technologies, Finnegan Henderson Farabow Garrett & Dunner, May 15, 2018: US09971894

The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement r ...


9