scispace - formally typeset
J

James Robert Walker

Researcher at Citrix Systems

Publications -  11
Citations -  1480

James Robert Walker is an academic researcher from Citrix Systems. The author has contributed to research in topics: Mobile device & Mobile database. The author has an hindex of 9, co-authored 11 publications receiving 1480 citations.

Papers
More filters
Patent

Policy-Based Application Management

TL;DR: In this paper, an improved technique for managing enterprise applications on mobile devices is described, where each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment.
Patent

Configuring and providing profiles that manage execution of mobile applications

TL;DR: In this article, a user interface is generated that allows an IT administrator or other operator to set, change and/or add to policy settings, and the policy settings can be formatted into a policy file and made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service.
Patent

Controlling mobile device access to secure data

TL;DR: In this article, the authors discuss the problem of providing secure containers or data vaults for data of one or more managed applications, where each managed application is assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application.
Patent

Application wrapping for application management framework

TL;DR: In this article, a software component, such as a native mobile application or a template application, may be modified into a managed mobile application, and metadata associated with the managed application may be generated.
Patent

Providing Virtualized Private Network Tunnels

TL;DR: In this paper, a per-application policy-controlled virtual private network (VPN) tunnel is proposed to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a perapplication policy controlled VPN tunnel during the lifetime of the ticket.