| 12293002 |
Security data storage systems |
Hoon-Ywen Li, Charlie Brown |
2025-05-06 |
| 10691808 |
Vulnerability analysis of software components |
Stanislav Dashevskyi |
2020-06-23 |
| 10318739 |
Computing optimal fix locations for security vulnerabilities in computer-readable code |
Helmut Petritsch |
2019-06-11 |
| 10250586 |
Security certification and application categorization for mobile device management |
Michael Herzberg |
2019-04-02 |
| 10248796 |
Ensuring compliance regulations in systems with dynamic access control |
Helmut Petritsch |
2019-04-02 |
| 10068093 |
Machine-checkable code-annotations for static application security testing |
Michael Herzberg |
2018-09-04 |
| 10038724 |
Electronic access controls |
Helmut Petritsch |
2018-07-31 |
| 9965633 |
Using code similarities for improving auditing and fixing of SAST-discovered code vulnerabilities |
Michael Herzberg |
2018-05-08 |
| 9762587 |
Grouping access control violations for process-aware systems |
Helmut Petritsch |
2017-09-12 |
| 9537893 |
Abstract evaluation of access control policies for efficient evaluation of constraints |
Helmut Petritsch |
2017-01-03 |
| 9305168 |
Modular static application security testing |
Thomas Deuster |
2016-04-05 |
| 9286187 |
Static enforcement of process-level security and compliance specifications for cloud-based systems |
Isabelle Hang |
2016-03-15 |
| 9256757 |
Prefetch of attributes in evaluating access control requests |
Helmut Petritsch |
2016-02-09 |
| 9235716 |
Automating post-hoc access control checks and compliance audits |
Helmut Petritsch |
2016-01-12 |
| 8959646 |
Automated detection and validation of sanitizers |
Tim Herres |
2015-02-17 |
| 8881293 |
Static application security testing |
Thomas Deuster |
2014-11-04 |
| 8473505 |
System and method for providing delegation assistance |
Helmut Petritsch |
2013-06-25 |