1
Michael S Jerger, Jeffrey A Bisset, Craig T Sinclair, Michael J Toutonghi: Administering permissions associated with a security zone in a computer system security model. Microsoft Corporation, Christensen O&apos Connor Johnson Kindness PLLC, November 20, 2001: US06321334 (303 worldwide citation)

Computer-based systems and methods are disclosed for a comprehensive security model for managing foreign content downloaded from a computer network. The methods and systems include the configuration of a system security policy that is stored on a host computer. The system security policy includes on ...


2
Michael S Jerger, Jeffrey A Bisset, Craig T Sinclair, Michael J Toutonghi: Declarative permission requests in a computer system. Microsoft Corporation, Christensen O&apos Connor Johnson Kindness PLLC, October 29, 2002: US06473800 (299 worldwide citation)

Computer-based systems and methods are disclosed for a comprehensive security model for managing active content downloaded from a computer network. The security model includes the configuration of a system security policy that is stored on a host computer. The system security policy is configured by ...


3
Michael S Jerger, Jeffrey A Bisset, Craig T Sinclair, Michael J Toutonghi: Directional set operations for permission based security in a computer system. Microsoft Corporation, Christensen O&apos Connor Johnson Kindness PLLC, February 5, 2002: US06345361 (177 worldwide citation)

Computer-based systems and methods are disclosed for a comprehensive security model for managing active content downloaded from a computer network. The security model includes the configuration of a system security policy that is stored on a host computer. The system security policy is configured by ...


4
Jeffrey A Bisset, Michael Jerger, Michael Toutonghi: Unshared scratch space. Microsoft Corporation, Klarquist Sparkman, June 24, 2003: US06584495 (27 worldwide citation)

A computerized method provides unshared local storage space to a process distributed by a trusted source through the use of an identity associated with the process that specifies local capabilities for the identity on a computer. The method obtains the identity and allocates the local storage space ...