| 12363168 |
Conditional access control policy finding generation |
Kasper Søe Luckow, Andrew Jude Gacek |
2025-07-15 |
| 12335318 |
Detecting conflicts between a generated access management policy and invoked access management policies |
Homer Strong, Neha Rungta |
2025-06-17 |
| 12034727 |
Analysis of role reachability with transitive tags |
John Cook, Neha Rungta, Carsten Varming, Daniel Kroening, Alejandro Naser Pastoriza |
2024-07-09 |
| 11777995 |
Resource state validation of access management policies |
Ujjwal Rajkumar Pugalia, Sean McLaughlin, Neha Rungta, Andrew Jude Gacek, Matthias Schlaipfer +5 more |
2023-10-03 |
| 11757886 |
Analysis of role reachability using policy complements |
John Cook, Neha Rungta, Carsten Varming, Daniel Kroening, Alejandro Naser Pastoriza |
2023-09-12 |
| 11736525 |
Generating access control policies using static analysis |
Neha Rungta, Willem Conradie Visser |
2023-08-22 |
| 11677789 |
Intent-based governance |
Neha Rungta, Andrew Jude Gacek, Marvin M. Theimer, Rebecca C. Weiss, Brigid Ann Johnson |
2023-06-13 |
| 11509730 |
Analyzing web service frontends to extract security-relevant behavior information |
Carsten Varming, Neha Rungta, Zhen Zhang |
2022-11-22 |
| 11483353 |
Generating access management policies from example requests |
Jiasi Shen, Homer Strong, Neha Rungta |
2022-10-25 |
| 11394661 |
Compositional reasoning techniques for role reachability analyses in identity systems |
John Cook, Neha Rungta, Andrew Jude Gacek, Carsten Varming |
2022-07-19 |
| 11218511 |
Resource state validation of access management policies |
Ujjwal Rajkumar Pugalia, Sean McLaughlin, Neha Rungta, Andrew Jude Gacek, Matthias Schlaipfer +5 more |
2022-01-04 |