• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content

Technical Disclosure Commons

  • My Account
  • Contact
  • FAQ
  • Home

Most Recent Additions*

PDF

Cognitive Integrity Firewall: Real-Time Detection of Prompt-Level Manipulation and Reasoning Compromise in AI Systems
Pranav Bhatnagar Mr

PDF

Agent-Driven Integration of Editorial Feedback and Redlining for Productivity Suites
John Lunney and Johannes Start

PDF

Graph-Reachability-Based Prerequisite Verification in Compliance Systems — Record-Existence Derivation
Jayson Winchester

PDF

Authorization Gateway for Legacy System Integration — Credential-Isolated Proxy with Record Translation
Jayson Winchester

PDF

Tamper-Evident Status Derivation from Cryptographic Execution Proof — Eliminating Mutable Status Fields
Jayson Winchester

PDF

Data Provenance Verification for Multi-Stage Processing Pipelines — Chained Integrity Binding
Jayson Winchester

PDF

Constrained Bearer Credentials for Decision-Gated Process Authorization
Jayson Winchester

PDF

Software-defined Runtime Dynamic Parallelism for Large Scale ML Systems
N/A

PDF

Privilege Separation Architecture — Structural Confinement of Analysis Components in Decision Systems
Jayson Winchester

PDF

Capability-Based Authorization for Compromised Component Containment — Decision-Derived Not Identity
Jayson Winchester

*Updated as of 02/21/26.

 
 

Browse

  • Collections
  • Disciplines
  • Inventors

Search

Advanced Search

  • Notify me via email or RSS

Submit

  • Author FAQ
  • Submit a Defensive Publication

Additional Information

  • Terms
  • Privacy
  • Copyright & Other Legal
 
Elsevier - Digital Commons

Home | FAQ | Contact | My Account | Accessibility Statement

Privacy