Author of the publication

Verifying Security Policies in Multi-agent Workflows with Loops.

, , , and . ACM Conference on Computer and Communications Security, page 633-645. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying hyperproperties of hardware systems., and . FMCAD, page 5. IEEE, (2016)Vehicle Platooning Simulations with Functional Reactive Programming., , , and . CoRR, (2018)The Hierarchy of Hyperlogics., , , and . LICS, page 1-13. IEEE, (2019)Deciding Hyperproperties., and . CONCUR, volume 59 of LIPIcs, page 13:1-13:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Collecting Statistics Over Runtime Executions., , and . Formal Methods Syst. Des., 27 (3): 253-274 (2005)Bounded Cycle Synthesis., and . CAV (1), volume 9779 of Lecture Notes in Computer Science, page 118-135. Springer, (2016)Encodings of Bounded Synthesis., , , and . TACAS (1), volume 10205 of Lecture Notes in Computer Science, page 354-370. (2017)Synthesizing Reactive Systems from Hyperproperties., , , , and . CoRR, (2019)Model Checking Quantitative Hyperproperties., , and . CoRR, (2019)AdamMC: A Model Checker for Petri Nets with Transits against Flow-LTL., , , and . CAV (2), volume 12225 of Lecture Notes in Computer Science, page 64-76. Springer, (2020)