| 12229311 |
Identifying sensitive data risks in cloud-based enterprise deployments based on graph analytics |
Julian James Stephen, Arjun Natarajan |
2025-02-18 |
| 11727142 |
Identifying sensitive data risks in cloud-based enterprise deployments based on graph analytics |
Julian James Stephen, Arjun Natarajan |
2023-08-15 |
| 11372997 |
Automatic audit logging of events in software applications performing regulatory workloads |
Suresh N. Chari, Ashish Kundu, Ian M. Molloy |
2022-06-28 |
| 10891371 |
Detecting malicious user activity |
Suresh N. Chari, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken |
2021-01-12 |
| 10628600 |
Automatic audit logging of events in software applications performing regulatory workloads |
Suresh N. Chari, Ashish Kundu, Ian M. Molloy |
2020-04-21 |
| 10599837 |
Detecting malicious user activity |
Suresh N. Chari, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken |
2020-03-24 |
| 10482265 |
Data-centric monitoring of compliance of distributed applications |
Suresh N. Chari, Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis, Josyula R. Rao +1 more |
2019-11-19 |
| 10007801 |
Automatic audit logging of events in software applications performing regulatory workloads |
Suresh N. Chari, Ashish Kundu, Ian M. Molloy |
2018-06-26 |
| 8789188 |
Method and apparatus for automatic determination of authorization requirements while editing or generating code |
Lawrence Koved, Jeff McAffer, Marco Pistoia |
2014-07-22 |
| 6771756 |
System and method to facilitate team communication |
Paul Bao-Luo Chou, Steve Moimann, Jennifer Lai, Stella J. Mitchell, Cezar Pendus +2 more |
2004-08-03 |