| 11797317 |
Transitioning legacy software to be provably correct |
Sean McLaughlin, Tongtong Xiang, Matthias Schlaipfer, Serdar Tasiran, John Cook +1 more |
2023-10-24 |
| 11777995 |
Resource state validation of access management policies |
Ujjwal Rajkumar Pugalia, Sean McLaughlin, Andrew Jude Gacek, Matthias Schlaipfer, John Michael Renner +5 more |
2023-10-03 |
| 11757886 |
Analysis of role reachability using policy complements |
John Cook, Carsten Varming, Daniel George Peebles, Daniel Kroening, Alejandro Naser Pastoriza |
2023-09-12 |
| 11750642 |
Automated threat modeling using machine-readable threat models |
Michael Tautschnig, John Cook, Pauline Virginie Bolignano, Todd Granger MacDermid, Oksana Tkachuk |
2023-09-05 |
| 11736525 |
Generating access control policies using static analysis |
Willem Conradie Visser, Daniel George Peebles |
2023-08-22 |
| 11677789 |
Intent-based governance |
Daniel George Peebles, Andrew Jude Gacek, Marvin M. Theimer, Rebecca C. Weiss, Brigid Ann Johnson |
2023-06-13 |
| 11616800 |
Security policy analyzer service and satisfiability engine |
John Cook, Catherine Dodge, Jeff Puchalski, Carsten Varming |
2023-03-28 |