Sharon Boeyen et al., 2002 - Google Patents
Liberty Trust Models GuidelinesSharon Boeyen et al., 2002
- Document ID
- 4686761372416835414
- Author
- Sharon Boeyen E
- Ellison G
- Niina Karhuluoma N
- William MacGregor S
- Paul Madsen E
- Senthil Sengodan N
- Serge Shinkar C
- Publication year
External Links
- 230000003993 interaction 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1615—Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function
- G06F1/1616—Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function with folding flat displays, e.g. laptop computers or notebooks having a clamshell configuration, with body parts pivoting to an open position around an axis parallel to the plane they define in closed position
- G06F1/162—Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function with folding flat displays, e.g. laptop computers or notebooks having a clamshell configuration, with body parts pivoting to an open position around an axis parallel to the plane they define in closed position changing, e.g. reversing, the face orientation of the screen with a two degrees of freedom mechanism, e.g. for folding into tablet PC like position or orienting towards the direction opposite to the user to show to a second user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1684—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
- G06F1/1688—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675 the I/O peripheral being integrated loudspeakers
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hunt | PKI and digital certification infrastructure | |
| EP3424176B1 (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
| US7512785B2 (en) | Revocation distribution | |
| US7743248B2 (en) | System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components | |
| Park et al. | Binding identities and attributes using digitally signed certificates | |
| Hunt | Technological infrastructure for PKI and digital certification | |
| Muftic | Bix certificates: Cryptographic tokens for anonymous transactions based on certificates public ledger | |
| Fahrenholtz et al. | Transactional security for a distributed reputation management system | |
| Jøsang et al. | PKI seeks a trusting relationship | |
| Selkirk | Using XML security mechanisms | |
| Park et al. | Trusted P2P computing environments with role-based access control | |
| Boeyen et al. | Liberty trust models guidelines | |
| van Oorschot | Public-key certificate management and use cases | |
| Boeyen et al. | Trust models guidelines | |
| Kumar et al. | A Novel Collaborative PKI Framework in Public Cloud | |
| Kumar et al. | Security enforcement using PKI in Semantic Web | |
| Sharon Boeyen et al. | Liberty Trust Models Guidelines | |
| Karamanian et al. | PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks | |
| Russell et al. | Virtual certificates and synthetic certificates: new paradigms for improving public key validation | |
| Sultan et al. | Overcoming Barriers to Client-Side Digital Certificate Adoption | |
| Wright | Secure digital archiving of high-value data | |
| Kandepet | An overview of public key infrastructure | |
| Mazaher et al. | A survey of state of the art in public key infrastructure | |
| Au et al. | A secure anonymous authorisation architecture for e-commerce | |
| Berbecaru et al. | Digital certificates and public-key infrastructures |