31
Suresh N Chari, Pau Chen Cheng, Josyula R Rao, Pankaj Rohatgi, Michael Steiner: Intrusion detection system. LAW OFFICE OF CHARLES W PETERSON JR Yorktown, July 20, 2006: US20060161982-A1

An intrusion detection system (IDS), method of protecting computers against intrusions and program product therefor. The IDS determines which applications are to run in native environment (NE) and places the remaining applications in a sandbox. Some of the applications in sandboxes may be placed in ...


32
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: System and method for fuzzy multi-level security. Keusey Tutunjian & Bitetto PC, November 9, 2006: US20060253709-A1

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


33
Pau Chen Cheng, John Andrew Clark, Yow Tzu Lim, Pankaj Rohatgi: Policy Evolution With Machine Learning. F Chau & Associates, Frank Chau, December 30, 2010: US20100332422-A1

A method for constructing a classifier which maps an input vector to one of a plurality of pre-defined classes, the method steps includes receiving a set of training examples as input, wherein each training example is an exemplary input vector belonging to one of the pre-defined classes, learning a ...


34
Kay S Anderson, Pau Chen Cheng, Mark D Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Method of Managing and Mitigating Security Risks Through Planning. International Business Machines Corporation, F Chau & Associates, November 12, 2009: US20090282487-A1

An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage p ...


35
Pau Chen Cheng, Pankaj Rohatgi, Claudia Keser, Josyula R Rao: Risk Adaptive Information Flow Based Access Control. George A Willinghan III, July 14, 2011: US20110173084-A1

Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, ...