21
Pau Chen Cheng, Pankaj Rohatgi, Claudia Keser, Josyula R Rao: Risk adaptive information flow based access control. International Business Machines Corporation, August Law, George Willinghan III, February 11, 2014: US08650623

Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, ...


22
Pau Chen Cheng, Stephen C Gates, Lawrence Koved, Wilfried Teiken: System and method to provide server control for access to mobile client data. International Business Machines Corporation, Tutunjian & Bitetto P C, Jeff LaBaw, July 19, 2016: US09396352

Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score and a current protection level of the data item. A policy is applied to determine an appropriate protection for the data item based u ...


23
Pau Chen Cheng, John Andrew Clark, Yow Tzu Lim, Pankaj Rohatgi: Policy evolution with machine learning. International Business Machines Corporation, F Chau & Associates, Preston J Young, December 10, 2013: US08606724

A method for constructing a classifier which maps an input vector to one of a plurality of pre-defined classes, the method steps includes receiving a set of training examples as input, wherein each training example is an exemplary input vector belonging to one of the pre-defined classes, learning a ...


24
Kay W Anderson, Pau Chen Cheng, Mark D Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Method of managing and mitigating security risks through planning. International Business Machines Corporation, Frank Chau Esq, F Chau & Associates, July 12, 2007: US20070162976-A1

An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage p ...


25
Suresh N Chari, Pau Chen Cheng, Kang Won Lee, Sambit Sahu, Anees A Shaikh: Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks. International Business Machines Corporation, Frank Chau, F Chau & Associates, January 29, 2004: US20040019781-A1

Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechani ...


26
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: System and method for fuzzy multi-level security. Keusey Tutunjian & Bitetto PC, October 23, 2008: US20080263662-A1

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


27
Suresh N Chari, Pau Chen Cheng, Pankaj Rohatgi, Charanjit Singh Jutla, Josyula R Rao, Michael Steiner: Cost effective incident response. Thomas A Beck Esq, November 17, 2005: US20050257269-A1

A response system which produces strategies to contain hosts compromised by a worm. One minimizes the damage so caused and the loss of business values induced by actions taken to protect a network. The approach uses logical representation of the target network. By abstracting low level information s ...


28
Kay Schwendimann Anderson, Pau Chen Cheng, Genady Ya Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner: System and method for security planning with hard security constraints. International Business Machines Corporation, F Chau & Associates, January 17, 2008: US20080016547-A1

A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard se ...


29
Kay Schwendimann Anderson, Pau Chen Cheng, Trenton Ray Jaeger, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Schuett Reninger, Grant Wagner: System and method for security planning with soft security constraints. Frank Chau Esq, F Chau & Associates, July 10, 2008: US20080168529-A1

A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at le ...


30
Kay Schwendimann Anderson, Pau Chen Cheng, Genady Ya Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktotovich Riabov, Pankai Rohatgi, Angela Marie Schuett, Grant Wagner: System and method for security planning with hard security constraints. F Chau & Associates, February 26, 2009: US20090055890-A1

A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard se ...