Abstract:
A system to update a filter to discourage a sender from communicating an electronic message to a user. The system receives a message from a sender that includes a network address of the sender and determines whether to discourage the sender from communicating a second message to the user based on input from a user. If a user indicates that the sender should be discouraged, the system updates the filter by registering the network address of the sender in the filter that is subsequently utilized to communicate a response message to the sender that includes an error code indicating that the network address of the user is an invalid network address. A system to use a filter to discourage a sender from communicating the second message to a user and a system to automatically remove a user from a mailing list are also described.
Abstract:
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing secure mobile data sharing. Actions can include: receiving, by the one or more processors, a request for secure mobile data sharing, the request being received from a mobile device and comprising a security definition; obtaining, by the one or more processors, based at least in part on the security definition of the request: a decryption key, a recipient identifier, and a security policy; receiving, by the one or more processors, a decryption request from a third-party device, the decryption request comprising an identifier distinguishing the third-party device as a recipient of an encrypted message corresponding to the decryption key; and providing the decryption key to the third-party device in response to validating the decryption request.
Abstract:
The present description refers in particular to a computer-implemented method, computer program product, and computer system for trust evaluation of sensor data during at least part of a sensor data life-cycle. The computer-implemented method may include evaluating an acquisition trust value (ATV) of sensor data at a sensor data acquisition module from at least one sensor node in a wireless sensor network (WSN), wherein the WSN comprises at least one sink, evaluating a delivery trust value (DTV) of sensor data at a sensor data delivery module from a sending entity to a receiving entity; and evaluating a processing trust value (PTV) at a sensor data processing module in a processing entity, to obtain a trust evaluation of the sensor data.
Abstract:
Methods and systems are provided for document encryption. In one embodiment, an adaptation engine is provided for partial encryption of a document. The adaptation engine may include a paginator for paginating the document into at least one sub-page according to characteristics of a specific device class. The adaptation engine may further include an encryptor for separately encrypting a to-be-encrypted element of the at least one sub-page using a partial encryption mechanism known by a client device that belongs to the specific device class.
Abstract:
Aryl-substituted bridged or fused diamine compounds, pharmaceutical compositions containing them, and methods of using the compounds and the pharmaceutical compositions for leukotriene A4 hydrolase (LTA4H or LTA4H) modulation and for the treatment of disease states, disorders, and conditions mediated by LTA4H activity, such as allergy, asthma, autoimmune diseases, pruritis, inflammatory bowel disease, ulcerative colitis, and cardiovascular disease, including atherosclerosis and prevention of myocardial infarction.
Abstract:
Aryl-substituted bridged or fused diamine compounds, pharmaceutical compositions containing them, and methods of using the compounds and the pharmaceutical compositions for leukotriene A4 hydrolase (LTA4H or LTA4H) modulation and for the treatment of disease states, disorders, and conditions mediated by LTA4H activity, such as allergy, asthma, autoimmune diseases, pruritis, inflammatory bowel disease, ulcerative colitis, and cardiovascular disease, including atherosclerosis and prevention of myocardial infarction.
Abstract:
Benzofuro- and benzothienopyrimidine compounds are described, which are useful as H4 receptor modulators. Such compounds may be used in pharmaceutical compositions and methods for the treatment of disease states, disorders, and conditions mediated by H4 receptor activity, such as allergy, asthma, autoimmune diseases, and pruritis.
Abstract:
The present description refers in particular to a method, a system, and a computer program product for access control using resource filters for a strict separation of application and security logic. The computer-implemented method for access control may include receiving at least one access request to at least one resource from an application; providing a resource hierarchy for the at least one resource, the resource having at least one resource class, wherein the resource hierarchy is defined in a single resource; providing a policy comprising at least one access control rule for accessing at least one element of the at least one resource class; verifying the at least one access request based on the policy through an authorization service; and processing the at least one access request through a service interface.
Abstract:
Systems and methods for automatically organizing and achieving a pre-given task by means of plurality of robots, each robot having a robot specific set of functionalities, are described. In an example implementation, a method can include the following steps: providing and exposing, for each robot, a semantic description of the robot's robot specific functionalities by respective semantic web services; providing a semantic description of the pre-given task; matching the semantically described task with the semantic web services describing the robot specific functionalities; and combining automatically a coordinated set of the plurality of robots according to the matching result, such that the task is achieved when the robots are sequentially working upon invocation.
Abstract:
A technique for protecting against installation of malicious software includes preventing interaction with a software product when keywords in a disclaimer associated with the software product are detected. A computing device identifies keywords in a disclaimer associated with a software product. If keywords are identified, further interaction with the software is prevented by removing interactive content that facilitates interaction with the software and adding interactive content facilitating sending a request to an administrator for permission to interact with the software. The administrator determines whether interaction with the software product is permitted.