1
Shaw Ben Shi, Michael Bradford Ault, Ernst Robert Plassmann, Bruce Arland Rich, Mickella Ann Rosiles, Theodore Jack London Shrader: Distributed file system web server user authentication with cookies. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, February 23, 1999: US05875296 (494 worldwide citation)

A method of authenticating a Web client to a Web server connectable to a distributed file system of a distributed computing environment. The distributed computing environment includes a security service for returning a credential to a user authenticated to access the distributed file system. In resp ...


2
Theodore Jack London Shrader, Michael Bradford Ault, Ernst Robert Plassmann, Bruce Arland Rich, Mickella Ann Rosiles, Shaw Ben Shi: Web server account manager plug-in for monitoring resources. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, February 15, 2000: US06026440 (310 worldwide citation)

An account manager plug-in for a Web server having an application programming interface (API). The plug-in is preferably a computer program product comprising a set of instructions (program code) encoded on a computer-readable substrate. This plug-in includes program code for establishing a set of o ...


3
David W Bachmann, Cynthia Fleming Corn, Larry George Fichtner, Rodolfo Augusto Mancisidor, Shaw Ben Shi: Method of hierarchical LDAP searching with relational tables. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, July 4, 2000: US06085188 (145 worldwide citation)

A method of hierarchical LDAP searching in an LDAP directory service having a relational database management system (DBMS) as a backing store. According to the invention, entries in a naming hierarchy are mapped into first and second relational tables: a parent table, and a descendant table. These t ...


4
Debora Jean Byrne, Chetan Ram Murthy, Shaw Ben Shi, Chin Long Shu: Lightweight directory access protocol (LDAP) directory server cache mechanism and method. International Business Machines Corporation, Jeffrey S LaBaw, Winstead Sechrest & Minick P C, February 12, 2002: US06347312 (127 worldwide citation)

A method of hierarchical LDAP searching in an LDAP directory service having a relational database management system (DBMS) as a backing store. The method begins in response to a search query to the relational database. Search results retrieved in response to the search query are cached, preferably i ...


5
Bruce Arland Rich, Theodore Jack London Shrader, Michael Bradford Ault, Ernst Robert Plassmann, Mickella Ann Rosiles, Shaw Ben Shi, Rodney Carl Burnett: Method and apparatus for enabling a web server to impersonate a user of a distributed file system to obtain secure access to supported web documents. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, June 29, 1999: US05918228 (114 worldwide citation)

A method of enabling a Web server to impersonate a Web client to thereby obtain access to files stored in a distributed file system of a distributed computing environment. The distributed computing environment includes a security service for returning a credential to a user authenticated to access t ...


6
Barry Keith Aldred, Debora Jean Byrne, Shaw Ben Shi, Ellen J Stokes: Method for storing sparse hierarchical data in a relational database. International Business Machines Corporation, Jeffrey S LaBaw, Winstead Sechrest & Minick P C, August 20, 2002: US06438549 (55 worldwide citation)

A method for securing sparse access control list (ACL) data in a relational database used as a backing store for a hierarchical-based directory service. The sparse ACL data is secured in a plurality of tables. An owner table stores data objects with explicitly set ACLs. A propagation table stores da ...


7
Dah Haur David Lin, Shaw Ben Shi, Yi Hsiu Wei: Dual counter consistency control for fault tolerant network file servers. International Business Machines Corporation, Jeffrey S LaBaw, January 27, 1998: US05713017 (53 worldwide citation)

A consistency control method for a fault tolerant file system. Data files in this fault tolerant file system are replicated on file system servers. The update request will be sent to all the file servers. However, since different servers might receive update requests in different order. The "dual-co ...


8
Shaw Ben Shi, Peter C T Wang: Parent/child subset locking scheme for versioned objects. International Business Machines Corporation, Jeffrey S LaBaw, April 22, 1997: US05623659 (51 worldwide citation)

For concurrent access by a plurality of users to a data set in a memory, a computer system first searches for a write lock on a first portion of the data set which the user wishes to access. For no write lock detected, the request is granted by allowing write access to the first portion. A write loc ...


9
Michael Bradford Ault, Ernst Robert Plassmann, Bruce Arland Rich, Shaw Ben Shi, Theodore Jack London Shrader: Method and apparatus for providing persistent fault-tolerant proxy login to a web-based distributed file service. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, October 26, 1999: US05974566 (49 worldwide citation)

A method of enabling persistent access by a Web server to files stored in a distributed file system of a distributed computing environment that includes a security service. A session manager is used to perform a proxy login to the security service on behalf of the Web server. Persistent operation of ...


10
Cynthia Fleming Corn, Larry George Fichtner, Rodolfo Augusto Mancisidor, Shaw Ben Shi: Efficient implementation of lightweight directory access protocol (LDAP) search queries with structured query language (SQL). International Business Machines Corporation, Jeffrey S LaBaw, Winstead Sechrest & Minick P C, March 12, 2002: US06356892 (43 worldwide citation)

A method of hierarchical LDAP searching in an LDAP directory service having a relational database management system (DBMS) as a backing store. The method begins by parsing an LDAP filter-based query for elements and logical operators of the filter query. For each filter element, the method generates ...