1
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: System and method for fuzzy multi-level security. International Business Machines Corporation, Keusey Tutunjian & Bitetto P C, Joseph Jones, May 5, 2009: US07530110 (10 worldwide citation)

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


2
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Fuzzy multi-level security. International Business Machines Corporation, Tutunjian & Bitetto P C, Preston J Young Esq, December 27, 2011: US08087090 (6 worldwide citation)

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


3
Pau Chen Cheng, Pankaj Rohatgi, Claudia Keser, Josyula R Rao: Risk adaptive information flow based access control. INTERNATIONAL BUSINESS MACHINES CORPORATION, Patent Portfolio Builders PLLC, February 28, 2017: US09582674

Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, ...


4
Pau Chen Cheng, Pankaj Rohatgi, Claudia Keser, Josyula R Rao: Risk adaptive information flow based access control. International Business Machines Corporation, August Law, George Willinghan III, February 11, 2014: US08650623

Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, ...


5
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: System and method for fuzzy multi-level security. Keusey Tutunjian & Bitetto PC, October 23, 2008: US20080263662-A1

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


6
Pau Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: System and method for fuzzy multi-level security. Keusey Tutunjian & Bitetto PC, November 9, 2006: US20060253709-A1

An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the r ...


7
Pau Chen Cheng, Pankaj Rohatgi, Claudia Keser, Josyula R Rao: Risk Adaptive Information Flow Based Access Control. George A Willinghan III, July 14, 2011: US20110173084-A1

Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, ...


8
Risk Adaptive Information Flow Based Access Control. INTERNATIONAL BUSINESS MACHINES CORPORATION, April 10, 2014: US20140101753-A1

Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, ...