| 12363168 |
Conditional access control policy finding generation |
Kasper Søe Luckow, Daniel George Peebles |
2025-07-15 |
| 12299154 |
Secure data handling discovery |
Jared Curran Davis, Harsh Raju Chamarthi, Neha Rungta, Vaibhav Sharma |
2025-05-13 |
| 12093160 |
IoT event detector correctness verification |
Vaibhav Sharma, Michael William Whalen, Saswat Padhi, Andrew Apicelli, Raveesh Yadav +7 more |
2024-09-17 |
| 11777995 |
Resource state validation of access management policies |
Ujjwal Rajkumar Pugalia, Sean McLaughlin, Neha Rungta, Matthias Schlaipfer, John Michael Renner +5 more |
2023-10-03 |
| 11677789 |
Intent-based governance |
Neha Rungta, Daniel George Peebles, Marvin M. Theimer, Rebecca C. Weiss, Brigid Ann Johnson |
2023-06-13 |
| 11483350 |
Intent-based governance service |
Pauline Virginie Bolignano, Tyler Stuart Bray, John Cook, Kasper Søe Luckow, Andrea Nedic +3 more |
2022-10-25 |
| 11483317 |
Techniques for analyzing security in computing environments with privilege escalation |
Pauline Virginie Bolignano, John Cook, Kasper Søe Luckow, Neha Rungta, Cole Nathan Schlesinger +2 more |
2022-10-25 |
| 11394661 |
Compositional reasoning techniques for role reachability analyses in identity systems |
John Cook, Neha Rungta, Daniel George Peebles, Carsten Varming |
2022-07-19 |
| 11301357 |
Method to check application programming interface correctness in software |
Neha Rungta, Lee Pike |
2022-04-12 |
| 11218511 |
Resource state validation of access management policies |
Ujjwal Rajkumar Pugalia, Sean McLaughlin, Neha Rungta, Matthias Schlaipfer, John Michael Renner +5 more |
2022-01-04 |
| 10977111 |
Constraint solver execution service and infrastructure therefor |
Neha Rungta, Temesghen Kahsai Azene, Pauline Virginie Bolignano, Kasper Soe Luckow, Sean McLaughlin +5 more |
2021-04-13 |
| 10922423 |
Request context generator for security policy validation service |
Neha Rungta, Kasper Søe Luckow, Carsten Varming, John Cook |
2021-02-16 |