Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics

作者: Urbanski William , Vidas Timothy , Danford Robert , Ramsey Jon , Hackworth Aaron

DOI:

关键词:

摘要: Methods and systems for developing distributing applications data building security can be provided. A plurality of policies set access and/or filtering based on selected parameters. One or more modules generated processing the data, with each governed by one module policies. Upon receipt a request to initiate execution process portion filtered it determined if violates applicable are not violated, executed data.

参考文章(116)
Jacqueline H. Wilson, Theodore S. Webb, Mukund P. Khatri, Jon R. Ramsey, System and method for operating malicious marker detection software on management controller of protected system ,(2013)
La Moine Zielieke, Scott Bolduc, Luke Samaha, Scott Bjerstedt, Data acquisition, normalization, and exchange in a retail ecosystem ,(2014)
Yoram Rimoni, Ashok Halambi, Rajarshi Gupta, Secure behavior analysis over trusted execution environment ,(2013)
Venu Aluri, Ravi Udaya Kumble, Kuldip Shetty, Sourav S. Bhattacharya, Vitesh Patel, Anirban Bhattacharya, Krishna Prasad Muraleedharan Pillai, Systems and methods for improved security and precision in executing analytics using sdks ,(2013)
Jacqueline H. Wilson, Theodore S. Webb, Mukund P. Khatri, Jon R. Ramsey, System and method for tamper resistant reliable logging of network traffic ,(2013)