J
Jeb R. Linton
Researcher at IBM
Publications - 69
Citations - 611
Jeb R. Linton is an academic researcher from IBM. The author has contributed to research in topics: Context (language use) & Verifiable computing. The author has an hindex of 12, co-authored 69 publications receiving 566 citations.
Papers
More filters
Patent
Cross-protocol federated single sign-on (F-SSO) for cloud enablement
TL;DR: In this paper, a federated single sign-on (F-SSO) request is received, which includes an assertion (e.g., an HTTP-based SAML assertion) having authentication data (such as an SSH public key, a CIFS username, etc.) for use to enable direct user access to a resource hosted in the compute cloud.
Journal ArticleDOI
Taking the leap between analytical chemistry and artificial intelligence: A tutorial review.
Lucas de Brito Ayres,Federico Jose Vicente Gomez,Jeb R. Linton,María Fernanda Silva,Carlos D. Garcia +4 more
TL;DR: In this paper, a tutorial review aimed to serve as a first step for junior researchers considering integrating artificial intelligence into their programs is presented, followed by a critical assessment of representative reports integrating AI with various sensors, spectroscopies, and separation techniques.
Patent
Secure management of a smart card
TL;DR: In this article, a hybrid security object is used to convert a protected object into a usable object that can be utilized by the processing circuit within a smart card, and a matrix barcode generator generates a matrix code that contains information about the user of the smart card.
Patent
Secure management of transactions using a smart/virtual card
TL;DR: In this paper, a method, system, and/or computer program product securely manages smart card transactions, where a processing entity receives a smart card identifier from the smart card, and a transaction confirmation is sent to the second party to the transaction.
Patent
Virtual machine images encryption using trusted computing group sealing
Rajiv Augu,Steven A. Bade,Jeb R. Linton,Dimitrios Pendarakis,George C. Wilson,Lee Hardy Wilson +5 more
TL;DR: In this paper, a host machine provisioned a virtual machine from a catalog of stock virtual machines, and the host machine instantiated the virtual machine based on customer inputs, to form a customer's configured virtual machine.