[go: up one dir, main page]

Sharon Boeyen et al., 2002 - Google Patents

Liberty Trust Models Guidelines

Sharon Boeyen et al., 2002

Document ID
4686761372416835414
Author
Sharon Boeyen E
Ellison G
Niina Karhuluoma N
William MacGregor S
Paul Madsen E
Senthil Sengodan N
Serge Shinkar C
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1615Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function
    • G06F1/1616Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function with folding flat displays, e.g. laptop computers or notebooks having a clamshell configuration, with body parts pivoting to an open position around an axis parallel to the plane they define in closed position
    • G06F1/162Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function with folding flat displays, e.g. laptop computers or notebooks having a clamshell configuration, with body parts pivoting to an open position around an axis parallel to the plane they define in closed position changing, e.g. reversing, the face orientation of the screen with a two degrees of freedom mechanism, e.g. for folding into tablet PC like position or orienting towards the direction opposite to the user to show to a second user
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1633Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
    • G06F1/1684Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
    • G06F1/1688Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675 the I/O peripheral being integrated loudspeakers

Similar Documents

Publication Publication Date Title
Hunt PKI and digital certification infrastructure
EP3424176B1 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
US7512785B2 (en) Revocation distribution
US7743248B2 (en) System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components
Park et al. Binding identities and attributes using digitally signed certificates
Hunt Technological infrastructure for PKI and digital certification
Muftic Bix certificates: Cryptographic tokens for anonymous transactions based on certificates public ledger
Fahrenholtz et al. Transactional security for a distributed reputation management system
Jøsang et al. PKI seeks a trusting relationship
Selkirk Using XML security mechanisms
Park et al. Trusted P2P computing environments with role-based access control
Boeyen et al. Liberty trust models guidelines
van Oorschot Public-key certificate management and use cases
Boeyen et al. Trust models guidelines
Kumar et al. A Novel Collaborative PKI Framework in Public Cloud
Kumar et al. Security enforcement using PKI in Semantic Web
Sharon Boeyen et al. Liberty Trust Models Guidelines
Karamanian et al. PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks
Russell et al. Virtual certificates and synthetic certificates: new paradigms for improving public key validation
Sultan et al. Overcoming Barriers to Client-Side Digital Certificate Adoption
Wright Secure digital archiving of high-value data
Kandepet An overview of public key infrastructure
Mazaher et al. A survey of state of the art in public key infrastructure
Au et al. A secure anonymous authorisation architecture for e-commerce
Berbecaru et al. Digital certificates and public-key infrastructures