Abstract:
A request handler may be configured to receive an enforcement request for enforcement of an obligation required as a condition for a previously-granted first resource access request. n obligation enforcer may be configured to enforce the obligation, based on the enforcement request, and a compliance manager may be configured to obtain certification of execution of the obligation from an obligation certification service, and to provide the certification as a basis for granting a second resource access request.
Abstract:
A computer-implemented method involves obtaining a web browser extension to a web browser, extracting the web browser extension's imported library dependencies, and evaluating security risks associated with the web browser extension and the imported library dependencies.
Abstract:
Aryl-substituted bridged or fused diamine compounds, pharmaceutical compositions containing them, and methods of using the compounds and the pharmaceutical compositions for leukotriene A4 hydrolase (LTA4H or LTA4H) modulation and for the treatment of disease states, disorders, and conditions mediated by LTA4H activity, such as allergy, asthma, autoimmune diseases, pruritis, inflammatory bowel disease, ulcerative colitis, and cardiovascular disease, including atherosclerosis and prevention of myocardial infarction.
Abstract:
The present description refers in particular to a method, a system, and a computer program product for access control using resource filters for a strict separation of application and security logic. The computer-implemented method for access control may include receiving at least one access request to at least one resource from an application; providing a resource hierarchy for the at least one resource, the resource having at least one resource class, wherein the resource hierarchy is defined in a single resource; providing a policy comprising at least one access control rule for accessing at least one element of the at least one resource class; verifying the at least one access request based on the policy through an authorization service; and processing the at least one access request through a service interface.
Abstract:
Thiazolopyridin-2-yloxy-phenyl and thiazolopyrazin-2-yloxy-phenyl amine compounds are described, which are useful as LTA4 hydrolase (LTA4H) modulators. Such compounds may be used in pharmaceutical compositions and methods for modulation of LTA4H and for the treatment of disease states, disorders, and conditions mediated by LTA4 hydrolase activity.
Abstract:
Compounds with two fused bicyclic heteroaryl moieties and their pharmaceutical compositions, and methods of using them as leukotriene A4 hydrolase (LTA4H) modulators and for the treatment of diseases, disorders and conditions mediated by LTA4H.
Abstract:
A system for providing secured access to an application service includes a challenge provider that uses a first cryptographic technique to provide a challenge to a client seeking access to an application service. The client uses a second cryptographic technique to generate a response, and provides the response to an authentication service. The authentication service grants the client access to the application service only if the challenge and response are authenticated using a first authentication technique complementary to the first cryptographic technique and a second authentication technique complementary to the second cryptographic technique, respectively.
Abstract:
Benzofuro- and benzothienopyrimidine compounds are described, which are useful as H4 receptor modulators. Such compounds may be used in pharmaceutical compositions and methods for the treatment of disease states, disorders, and conditions mediated by H4 receptor activity, such as allergy, asthma, autoimmune diseases, and pruritis.
Abstract translation:描述了苯并呋喃和苯并噻吩并嘧啶化合物,其可用作H 4 S 5受体调节剂。 这样的化合物可以用于治疗由H 4 S受体活性介导的疾病状态,病症和病症的药物组合物和方法,例如过敏,哮喘,自身免疫疾病和瘙痒症。
Abstract:
An enterprise system with secure wireless messaging includes an application service to process a message. The enterprise system also includes a security service that uses a cryptographic technique to transform between the message and a secure message that is based on the message. A communication service communicates the secure message with a mobile client using a public network. The message may be secured using a cryptographic technique to provide end-to-end security. The enterprise system also may include an information service including information indicating occurrence of a triggering event. The information indicating occurrence of a triggering event may cause the enterprise system to push a secure message to the mobile client.
Abstract:
A method, for automatically controlling a data submission in a forum, the control being based on the respective data content, comprises: the data content submitted by a user for the forum is automatically parsed with respect to specifically selected characters, the selected characters being provided together with respective selection ancillary information, if any selected character is found within the data content, the respective selection ancillary information is analyzed, the data is handled conformable with the analyzed respective selection ancillary information, an answer for the user is elaborated, the answer including the respective found character together with an appropriate analysis of its selection ancillary information and informing the user about the manner the data is handled, and the elaborated answer is communicated to the user.