Number | Name | Date | Kind |
---|---|---|---|
5413383 | Laurash et al. | May 1995 | A |
5640453 | Schuchman et al. | Jun 1997 | A |
5640560 | Smith | Jun 1997 | A |
5734898 | He | Mar 1998 | A |
5790753 | Krishnamoorthy et al. | Aug 1998 | A |
5822291 | Brindze et al. | Oct 1998 | A |
5857021 | Kataoka et al. | Jan 1999 | A |
5875296 | Shi et al. | Feb 1999 | A |
5878233 | Schloss | Mar 1999 | A |
5892825 | Mages et al. | Apr 1999 | A |
5913210 | Call | Jun 1999 | A |
5915093 | Berlin et al. | Jun 1999 | A |
5930767 | Reber et al. | Jul 1999 | A |
5933497 | Beetcher et al. | Aug 1999 | A |
5943304 | Kamada et al. | Aug 1999 | A |
5956482 | Agraharam et al. | Sep 1999 | A |
5978773 | Hudetz et al. | Nov 1999 | A |
5987525 | Roberts et al. | Nov 1999 | A |
5991399 | Graunke et al. | Nov 1999 | A |
5995965 | Experton | Nov 1999 | A |
6016166 | Huang et al. | Jan 2000 | A |
6018768 | Ullman et al. | Jan 2000 | A |
6034937 | Kumagai | Mar 2000 | A |
6044403 | Gerszberg et al. | Mar 2000 | A |
6052717 | Reynolds et al. | Apr 2000 | A |
6052785 | Lin et al. | Apr 2000 | A |
6055314 | Spies et al. | Apr 2000 | A |
6061057 | Knowlton et al. | May 2000 | A |
6101534 | Rothschild | Aug 2000 | A |
6134593 | Alexander et al. | Oct 2000 | A |
6138150 | Nichols et al. | Oct 2000 | A |
6145006 | Vishlitsky et al. | Nov 2000 | A |
6154738 | Call | Nov 2000 | A |
6154844 | Touboul et al. | Nov 2000 | A |
6157953 | Chang et al. | Dec 2000 | A |
6182222 | Oparaji | Jan 2001 | B1 |
6189032 | Susaki et al. | Feb 2001 | B1 |
6219675 | Pal et al. | Apr 2001 | B1 |
6226235 | Wehmeyer | May 2001 | B1 |
6229523 | Czako | May 2001 | B1 |
6230174 | Berger et al. | May 2001 | B1 |
6233618 | Shannon | May 2001 | B1 |
6239793 | Barnert et al. | May 2001 | B1 |
6243692 | Floyd et al. | Jun 2001 | B1 |
6289165 | Abecassis | Sep 2001 | B1 |
6301661 | Shambroom | Oct 2001 | B1 |
6331865 | Sachs et al. | Dec 2001 | B1 |
6374402 | Schmeidler et al. | Apr 2002 | B1 |
Entry |
---|
Henry M. Gladney, “Safeguarding Digital Library Contents and Users: Document Access Control”, Dlib Magazine, hffp://www.dlib.org/dlib/june97/ibm/06gladdney.html, Jun. 1997.* |
Edgar Weipp, “An Approach to Role-Based Access Control for Digital Content”, 2001, IEEE, pp. 290-294.* |
David Doering, NSM Galaxy Jukebox, E Media Professionals Reviews, ( pp. 78-80). |