Verifying Security Policies in Multi-agent Workflows with Loops.
Bernd FinkbeinerChristian MüllerHelmut SeidlEugen ZalinescuPublished in: CCS (2017)
Keyphrases
- security policies
- multi agent
- access control
- distributed systems
- network security
- security management
- data processing
- security concerns
- security requirements
- access control policies
- multi agent systems
- access control systems
- ubiquitous computing environments
- unauthorized access
- business processes
- reinforcement learning
- workflow management systems
- multilevel secure
- home network
- model checking
- business process
- intelligent agents
- computer systems
- access control mechanism
- web services