DR. RONALD P WILLIAMS, MD
Medical Practice at 38 St, Austin, TX

License number
Texas H6985
Category
Medical Practice
Type
Orthopaedic Surgery
Address
Address 2
901 W 38Th St STE 200, Austin, TX 78705
PO Box 911230, Dallas, TX 75391
Phone
(512) 421-4100
(512) 454-4575 (Fax)
(972) 997-8000
(972) 234-0813 (Fax)

Personal information

See more information about RONALD P WILLIAMS at radaris.com
Name
Address
Phone
Ronald Williams, age 90
504 Tahiti Dr, Granbury, TX 76048
(817) 219-5947
Ronald Williams, age 62
503 Buckboard Blvd, Round Rock, TX 78681
(512) 586-5613
Ronald Williams, age 72
5027 Lodenberry Ct, Katy, TX 77494
(281) 395-1609
Ronald Williams
5011 S Belt St, Brazoria, TX 77422
(979) 709-7893
Ronald Williams, age 72
5207 Avenue M, Galveston, TX 77551
(409) 460-0438

Professional information

See more information about RONALD P WILLIAMS at trustoria.com
Ronald Williams Photo 1
Associating Security Information With Information Objects In A Data Processing System

Associating Security Information With Information Objects In A Data Processing System

US Patent:
7647630, Jan 12, 2010
Filed:
Dec 15, 2005
Appl. No.:
11/304971
Inventors:
Diana J. Arroyo - Austin TX, US
Damir A. Jamsek - Austin TX, US
Sridhar R. Muppidi - Austin TX, US
Kimberly D. Simon - Austin TX, US
Ronald B. Williams - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 7/04, G06F 12/00
US Classification:
726 21, 713167, 713170, 713181, 713166
Abstract:
A method for authorizing information flows based on security information associated with information objects is provided. A hash key is generated based on an information object and a lookup operation is performed in a hash table based on the hash key. A determination is made whether an entry in the hash table at an index corresponding to the hash key identifies a labelset for the information object. A labelset, identifying a sensitivity of the information object, is stored in the entry at the index corresponding to the hash key for the information object if a labelset for the information object is not identified in the entry in the hash table. Information flows involving the information object are authorized based on a lookup of the labelset associated with the information object in the hash table. The hash table may be a multidimensional hash table.


Ronald Williams Photo 2
Associating Security Information With Information Objects

Associating Security Information With Information Objects

US Patent:
7975295, Jul 5, 2011
Filed:
May 30, 2008
Appl. No.:
12/130027
Inventors:
Diana J. Arroyo - Austin TX, US
Damir A. Jamsek - Austin TX, US
Sridhar R. Muppidi - Austin TX, US
Kimberly D. Simon - Austin TX, US
Ronald B. Williams - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
726 21, 713176, 713170, 713166, 713167, 726 4
Abstract:
A hash key is generated based on an information object and a lookup operation is performed in a hash table based on the hash key. A determination is made whether an entry in the hash table at an index corresponding to the hash key identifies a labelset for the information object. A labelset, identifying a sensitivity of the information object, is stored in the entry at the index corresponding to the hash key for the information object if a labelset for the information object is not identified in the entry in the hash table. Information flows involving the information object are authorized based on a lookup of the labelset associated with the information object in the hash table. The hash table may be a multidimensional hash table.


Ronald P Williams Photo 3
Dr. Ronald P Williams - MD (Doctor of Medicine)

Dr. Ronald P Williams - MD (Doctor of Medicine)

Procedures:
Anterior Cruciate Ligament (Acl) Surgeries, Arthrocentesis, Arthroplasty, Arthroscopy, Aspiration, Carpal Tunnel Release, Cortisone Injection, Discectomy, Endoscopic Therapy, Endoscopy
Hospitals:
Texas Oncology PA
901 W 38Th St SUITE 200, Austin 78705
St. David's Medical Center
919 East 32Nd St, Austin 78705
St. Lukes Baptist Hospital
7930 Floyd Curl Dr, San Antonio 78229
Texas Oncology PA
901 W 38Th St SUITE 200, Austin 78705
St. David's Medical Center
919 East 32Nd St, Austin 78705
St. Lukes Baptist Hospital
7930 Floyd Curl Dr, San Antonio 78229
Education:
Medical Schools
Univ Of Tx Med Sch At San Antonio
Graduated: 1984


Ronald Williams Photo 4
Owner At Rlwinssurance Associates

Owner At Rlwinssurance Associates

Position:
owner at rlwinssurance associates
Location:
Dallas/Fort Worth Area
Industry:
Insurance
Work:
rlwinssurance associates - owner


Ronald Keith Williams Photo 5
Ronald Keith Williams, Dallas TX - Lawyer

Ronald Keith Williams, Dallas TX - Lawyer

Address:
6935 Hillcrest Ave, Dallas, TX 75205
Experience:
23 years
Specialties:
Business Law, Public Utility
Jurisdiction:
Texas (2001)
Law School:
University Of Tulsa
Languages:
Spanish
Memberships:
Texas State Bar (2001)


Ronald Williams Photo 6
Reference Monitor Method For Enforcing Information Flow Policies

Reference Monitor Method For Enforcing Information Flow Policies

US Patent:
7512792, Mar 31, 2009
Filed:
Dec 15, 2005
Appl. No.:
11/304853
Inventors:
Diana J. Arroyo - Austin TX, US
Damir A. Jamsek - Austin TX, US
Sridhar R. Muppidi - Austin TX, US
Kimberly D. Simon - Austin TX, US
Ronald B. Williams - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00, G06F 7/04, G06F 12/14
US Classification:
713167, 726 4, 726 17, 726 27
Abstract:
A reference monitor system, apparatus, computer program product and method are provided. In one illustrative embodiment, elements of the data processing system are associated with security data structures in a reference monitor. An information flow request is received from a first element to authorize an information flow from the first element to a second element. A first security data structure associated with the first element and a second security data structure associated with the second element are retrieved. At least one set theory operation is then performed on the first security data structure and the second security data structure to determine if the information flow from the first element to the second element is to be authorized. The security data structures may be labelsets having one or more labels identifying security policies to be applied to information flows involving the associated element.


Ronald Williams Photo 7
System And Method For Authorizing Information Flows

System And Method For Authorizing Information Flows

US Patent:
2007014, Jun 21, 2007
Filed:
Dec 15, 2005
Appl. No.:
11/304933
Inventors:
Diana Arroyo - Austin TX, US
George Blakley - Round Rock TX, US
Damir Jamsek - Austin TX, US
Sridhar Muppidi - Austin TX, US
Kimberly Simon - Austin TX, US
Ronald Williams - Austin TX, US
International Classification:
H04L 9/32, H04N 7/16, G06F 17/30, H04L 9/00, G06F 12/14, G06F 7/04, G06F 12/00, G06K 9/00, G06F 13/00, H03M 1/68, H04K 1/00, G06F 7/58, G06K 19/00, G11C 7/00
US Classification:
713166000, 713165000, 713167000, 726026000, 726027000, 726030000, 726020000, 713175000, 713172000
Abstract:
A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow.


Ronald Williams Photo 8
Method And System For Secure Server-Based Session Management Using Single-Use Http Cookies

Method And System For Secure Server-Based Session Management Using Single-Use Http Cookies

US Patent:
8005965, Aug 23, 2011
Filed:
Jun 30, 2001
Appl. No.:
09/896195
Inventors:
Ronald B. Williams - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709228, 709224, 709227, 709229
Abstract:
A methodology for providing secure session management is presented. After a single-use token has been issued to a client, it presents the token, and the server may identify the client based upon the presented token. However, the token may be used only once without being refreshed prior to re-use, thereby causing the token to be essentially reissued upon each use. The token comprises a session identifier that allows the issuer of the token to perform session management with respect to the receiving entity. Tokens can be classified into two types: domain tokens and service tokens. Domain tokens represent a client identity to a secure domain, and service tokens represent a client identity to a specific service. A domain token may be used with any service within a domain that recognizes the domain token, but a service token is specific to the service from which it was obtained.


Ronald Williams Photo 9
Authorizing Information Flows Based On A Sensitivity Of An Information Object

Authorizing Information Flows Based On A Sensitivity Of An Information Object

US Patent:
8527754, Sep 3, 2013
Filed:
Aug 19, 2011
Appl. No.:
13/213799
Inventors:
Diana J. Arroyo - Austin TX, US
Damir A. Jamsek - Austin TX, US
Sridhar R. Muppidi - Austin TX, US
Kimberly D. Simon - Austin TX, US
Ronald B. Williams - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
US Classification:
713167, 709221
Abstract:
A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow.


Ronald Williams Photo 10
Ronald Williams

Ronald Williams

Location:
Dallas/Fort Worth Area
Industry:
Plastics