Verifying Security Policies in Multi-agent Workflows with Loops.
Bernd FinkbeinerChristian MüllerHelmut SeidlEugen ZalinescuPublished in: CoRR (2017)
Keyphrases
- security policies
- multi agent
- access control
- security management
- distributed systems
- network security
- security concerns
- security requirements
- multi agent systems
- data processing
- reinforcement learning
- access control systems
- access control policies
- business processes
- model checking
- web services
- business process
- ubiquitous computing environments
- fine grained
- home network
- distributed environment
- intelligent agents
- event logs
- workflow management systems
- access control mechanism
- intrusion detection
- anomaly detection
- unauthorized access