Search

Khalid A Asad

from Frederick, MD
Age ~61

Khalid Asad Phones & Addresses

  • 8721 Doctor Baxter Rd, Frederick, MD 21701 (301) 662-0690
  • 509 Hollyberry Way, Frederick, MD 21703 (301) 694-0596
  • 6002 Linganore Rd, Frederick, MD 21701 (301) 662-0690
  • 6002B Linganore Rd, Frederick, MD 21701
  • 17606 Towne Crest Ct, Gaithersburg, MD 20877 (301) 977-6394
  • Ijamsville, MD
  • York, PA

Resumes

Resumes

Khalid Asad Photo 1

Khalid Asad

View page
Location:
Washington D.C. Metro Area
Industry:
Professional Training & Coaching
Khalid Asad Photo 2

Khalid Asad

View page
Location:
509 Hollyberry Way, Frederick, MD 21703
Industry:
Information Technology And Services
Skills:
Enterprise Architecture
Solution Architecture
Integration
Soa
It Strategy
Cloud Computing
Itil
Virtualization
Systems Management
Web Services
Information Security
Business Intelligence
Requirements Analysis
Unix
Software Development
Enterprise Software
Architectures
Sdlc
Websphere
Agile Methodologies
Software Project Management
It Service Management
Khalid Asad Photo 3

Khalid Asad

View page

Business Records

Name / Title
Company / Classification
Phones & Addresses
Khalid Asad
Advisor
City of Philadelphia
Municipality Office · Executive Office · General Government · Municipality · Land/Mineral/Wildlife Conservation · Public Finance/Taxation/Monetary Policy · Administrative Social/Manpower Programs · Business Association Executive Office
(215) 683-4400, (215) 683-6050, (215) 683-2058, (215) 683-4347

Publications

Wikipedia References

Khalid Asad Photo 4

Khalid Hussain Asad

Isbn (Books And Publications)

Das Tempelgrab Nr. 36 in Palmyra: Studien Zur Palmyrenischen Grabarchitektur Und Ihrer Ausstattung

View page
Author

Khalid Asad

ISBN #

3805313136

Die Textilien Aus Palmyra: Neue Und Alte Funde

View page
Author

Khalid Asad

ISBN #

3805325924

Us Patents

Key Ring Organizer For An Electronic Business Using Public Key Infrastructure

View page
US Patent:
6539093, Mar 25, 2003
Filed:
Dec 31, 1998
Appl. No.:
09/223803
Inventors:
Khalid Asad - Frederick MD
Michael A. Brown - Vienna VA
Adarsh Gupta - Potomac MD
Manjit Singh Kohli - Germantown MD
J. Matthew Sebastian - Reston VA
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 908
US Classification:
380279, 380280, 713155, 713201, 705 67, 705 71
Abstract:
Users and security aware applications are able to request operations on and manipulate role based digital certificates (and their corresponding private keys) distributed among multiple key rings through the use of a Key Ring Organizer (KRO). In a typical use of the KRO, the computer network is coupled to a secure server and at least one end-user terminal; a Registration Authority; and an organization server hosting secure applications. The end-user terminal includes a general purpose Web browser with a KRO plug-in module and a KRO managing a set of key rings, where each key ring may contain multiple keys. The KRO components include the KRO, a set of KRO catalogs (typically one), a built-in key ring, and multiple external key rings. A key ring can be of any type, including a smart card, key disk, or remote file. A catalog (typically a file) contains a set of entries in which each entry contains a set of attributes and a reference to a key record stored in a key ring.

Secure Server Using Public Key Registration And Methods Of Operation

View page
US Patent:
6715073, Mar 30, 2004
Filed:
Dec 31, 1998
Appl. No.:
09/223766
Inventors:
Larry An - Great Falls VA
Hamid Bacha - Great Falls VA
Robert Briggs - Burke VA
Robert Burns - Pembroke Pines FL
Robert B. Carroll - Mt. Kisco NY
Mark Fisk - North Potomac MD
Hatem Ghafir - Olney MD
Raymond Good - Ashburn VA
Srinivasa Kasturi - Annadale VA
Ku Lee - Germantown MD
Drew Kittel - Washington DC
Lolo Lasida - Alexandria VA
Hiroshi Maruyama - Tokyo, JP
Amit Pamecha - Fairfax VA
Paresh Patel - Leicester, GB
Dieter Poetzschke - North Potomac MD
Roger Reider - Silver Spring MD
Khalid Asad - Frederick MD
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 900
US Classification:
713156, 713151, 713152, 713155, 713193, 713201, 380 30
Abstract:
A secure-end-to-end communication system for electronic business system and method of operation, e. g. , the Internet, includes a web serverâvault controller having personal storage vaults in the controller for users, registration and certification authorities. Each personal vault runs programs on the controller under a unique UNIX user ID. Data storage is provided by the controller wherein the storage is owned by the same user ID assigned to the vault. A registration authority running as a software application in the controller processes requests to issue, renew and revoke digital certificates issued by a certification authority using two pairs of public-private keys. The registration authority interacts with the vault controller to decide whether an applicant qualifies to receive a digital certificate. The certification authority running as software application in the controller includes a certificate management system that provides services such as issuing, revoking, suspending, resuming, and renewing a users right to digital certificates.

Apparatus And Method For Protecting Against Data Tampering In An Audit Subsystem

View page
US Patent:
6725240, Apr 20, 2004
Filed:
Aug 8, 2000
Appl. No.:
09/634030
Inventors:
Khalid A. Asad - Frederick MD
Subodh A. Samuel - Reston VA
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1730
US Classification:
707202, 714 20
Abstract:
A data processing system and method stores a relational database in which audit records are stored without compromising the ability to detect data tampering. The technique provides for detection of unauthorized row modification, row deletion, and row insertion. Extra measures are incorporated to protect from administrator attacks. In addition, the technique enables integrity checking and audit log archiving without having to suspend or bring down the audit subsystem. These on-line capabilities are especially important in mission critical applications which must satisfy the requirement that the application be disabled if the audit subsystem is not functioning properly.

Event Based Model For Managing Application Health And Failure Recovery For Asynchronous Processing Systems

View page
US Patent:
20120324282, Dec 20, 2012
Filed:
Jun 14, 2011
Appl. No.:
13/159744
Inventors:
Khalid A. Asad - Frederick MD, US
David S. Cruley - Oak Hill VA, US
John DiClemente - Montgomery Village MD, US
Paul Ilechko - Skillman NJ, US
David J. Mulley - Raleigh NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 11/07
US Classification:
714 16, 714E11023
Abstract:
A method for event management in asynchronous work processing including timing at least one step in an asynchronous work process, wherein the at least one step is performed by an application and the at least one step has an expected time of completion; determining an error preventing step completion in response to the expected time of completion expiring; correcting the error; and re-performing the at least one step.

Integrity Mechanism For Data Transfer In A Windowing System

View page
US Patent:
55902669, Dec 31, 1996
Filed:
Oct 11, 1994
Appl. No.:
8/321644
Inventors:
Mark E. Carson - Montogomery County MD
Mudumbai Ranganathan - Montogomery County MD
Janet A. Cugini - Frederick County MD
Khalid A. Asad - Frederick MD
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1500
US Classification:
395340
Abstract:
A secure process for untrusted windowing system client programs to transfer data between security domains is mediated by a special trusted client program, the Selection Manager. The mechanism used can be configured to meet the Compartmented Mode Workstation (CMW) requirements capability for regrading cut and paste operations. To meet the CMW cut and paste requirements and to prevent the regrading selection mechanism from acting as a covert channel, the regrading selection mechanism uses dummy window IDs in communicating to the lower level process during a Mandatory Access Control (MAC) upgrade operation, and for all regrading operations, an event is sent to the Selection Manager that causes the Selection Manager to put up a pop-up requesting user confirmation before the transfer is allowed to proceed. This selection mechanism supports configurable regrading selection operations for cutting and pasting (MAC upgrading for all users, MAC downgrading for privileged users, and information label upgrading and downgrading for all users).
Khalid A Asad from Frederick, MD, age ~61 Get Report