scispace - formally typeset
Search or ask a question
Institution

Novell

About: Novell is a based out in . It is known for research contribution in the topics: Object (computer science) & Virtual machine. The organization has 694 authors who have published 885 publications receiving 39295 citations. The organization is also known as: Novell, Inc..


Papers
More filters
Patent
29 Oct 2007
TL;DR: In this paper, the protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing devices is described, and different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating.
Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.

967 citations

Patent
03 Dec 1999
TL;DR: In this article, the authors propose a method and system for monitoring or profiling quality of service within one or more information sources in a network of computers, which includes a step of providing a network-of-computers, each being coupled to each other to form a local area network.
Abstract: A method and system ( 100 ) for monitoring or profiling quality of service within one or more information sources in a network of computers. The method includes a step of providing a network of computers, each being coupled to each other to form a local area network. The network of computers has a firewall server ( 110 ) coupled to the network of computers and a distributed traffic management tool coupled to the firewall server. The method also includes implementing traffic monitoring or profiling of incoming and outgoing information from one of the information sources.

793 citations

Patent
Pauline Shuen1
20 Mar 1995
TL;DR: In this article, the authors describe a home router that assigns a virtual address to each mobile node on a given network when that node logs-in with the home router, which does not change throughout a session.
Abstract: An internetwork including a plurality of local area networks may include wireless and hard-wired local area networks. The internetwork may also include wide area network links between routers. The system includes routers between networks, which may be bridged networks. Certain routers are configured as home routers. Home routers bind two addresses for each mobile node on a given network when that node logs-in with a home router. Mobile nodes log-in with a home router that assigns a virtual address that does not change throughout a session. Each time, a mobile node roams to another network across a router boundary, the virtual address remains the same and all packets directed to the mobile node are received by the home router which advertises that it can reach the mobile node. As the mobile node roams, it reports back to the home router a local address to which the home router forwards all packets directed originally by correspondent nodes to the virtual address. Mobile nodes may log-in to a router many hops removed from a local area network of the situs. Mobile nodes may also roam across wide area links. The system is transparent to a user.

619 citations

Patent
28 Aug 2003
TL;DR: In this paper, the target server and the border server utilize various combinations of secure and non-secure caches for secure access to a network from an external client, where requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border and the external client carries user authentication information.
Abstract: Methods, signals, devices, and systems are provided for secure access to a network from an external client. Requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border server and the external client carries user authentication information. After the user is authenticated to the network, requests may be redirected back to the original target server. Web pages sent from the target server to the external client are scanned for non-secure URLs such as those containing "http://" and modified to make them secure. The target server and the border server utilize various combinations of secure and non-secure caches. Although tunneling may be used, the extensive configuration management burdens imposed by virtual private networks are not required.

539 citations

Patent
22 Aug 1997
TL;DR: In this article, an information retrieval system that represents the content of a language-based database being searched as well as the user's natural language query is presented. And the system includes a non-real-time development system for automatically creating a database index having one or more contentbased database keywords.
Abstract: An information retrieval system that represents the content of a language-based database being searched as well as the user's natural language query. In accordance with one aspect of the invention, the information retrieval system includes a non-real-time development system for automatically creating a database index having one or more content-based database keywords of the data base; and a real-time retrieval system that, in response to a user's natural language query, searches the keyword index for one or more content-based query keywords derived from the natural language query. The development system and the retrieval system morphologically, syntactically and linguistically analyze the data base and the natural language query, respectively, to generate the one or more database keywords and query keywords representing the content of the database and the natural language query, respectively. The development system includes a software development system for creating the database index utilizing a pattern dictionary that includes synonyms and skip words and a morphosyntactic dictionary that includes morphological and syntactic information for words in the natural language of the language-based database and the natural language query. In one embodiment, the retrieval system includes a natural language interface system for creating the one or more query keywords utilizing the pattern dictionary and the morphosyntactic dictionary. In one embodiment, the retrieval system also includes a query-index matcher for matching the one or more query keywords with the one or more database keywords.

527 citations


Authors

Showing all 694 results

Network Information
Related Institutions (5)
Blue Martini Software
24 papers, 4.5K citations

79% related

Narus
162 papers, 6.5K citations

78% related

Gracenote
202 papers, 5.4K citations

76% related

Oculus VR
679 papers, 3.8K citations

76% related

Akamai Technologies
569 papers, 33.5K citations

75% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20154
20145
20138
20128
201131
201050