Research papers hold ideas you won't find in any docs, blog posts, or explainer videos. They're also brutal to read, and can leave you frustrated. This talk is about how to actually read one, layer by layer. First what the paper is about, then why it's important, and finally how it works. We'll start with AWS IAM Access Analyzer and it's paper on Stratified Predicate Abstraction. Then we'll work backwards through the research papers it's built on, learning about SMT solvers and Decision Procedures. You'll walk out with a method you can use on any paper, in any field.
What this session is about
Playbook
Editorial commentary · what to actually do about this on Monday
Independent editorial perspective — not an official AWS or speaker statement. Designed for executives evaluating what to brief their teams on next.
Live updates related to this session LIVE
Sourced via Parallel AI Monitor — continuous web watch on 21 topical streams. Updated .
- labs.cloudsecurityalliance.org high confidence Agent identity & delegation
NIST AI Agent Standards: Enterprise Governance Implications
Fastio has formalized new architectural patterns for scaling multi-agent systems, including Sequential Handoff (Pipeline), The Router (Dispatcher), Hierarchical (Manager-Worker), and Bidirectional/Joint Collaboration. A significant practical implication is the emergence of 'Deleg
- prnewswire.com Agent-native data infrastructure
prnewswire.com
Constructive announced and open-sourced "agentic-db": a purpose-built Postgres "memory layer" for AI agents providing long-term episodic memory, conversation and tool-call event logs, token accounting, a versioned skills/tools registry, rules/behavioral policies for governance, t
- api.aport.io high confidence Agent identity & delegation
AI Agent Authentication & Authorization in 2026: What Works ...
A new authorization architecture known as the Three-Layer Model has been proposed by APort. This framework shifts security from prompt-based controls to deterministic infrastructure policies across three layers: Authentication (using OAuth 2.0, OIDC, SPIFFE/SVID, mTLS), API Autho
External links matched to this session via topic relevance. The KB does not endorse third-party content; verify before citing.