Author of the publication

Verifying Security Policies in Multi-agent Workflows with Loops.

, , , and . ACM Conference on Computer and Communications Security, page 633-645. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying hyperproperties of hardware systems., and . FMCAD, page 5. IEEE, (2016)The Hierarchy of Hyperlogics., , , and . LICS, page 1-13. IEEE, (2019)Collecting Statistics Over Runtime Executions., , and . Formal Methods Syst. Des., 27 (3): 253-274 (2005)Deciding Hyperproperties., and . CONCUR, volume 59 of LIPIcs, page 13:1-13:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Synthesizing Skeletons for Reactive Systems., and . ATVA, volume 9938 of Lecture Notes in Computer Science, page 271-286. (2016)Probabilistic Hyperproperties of Markov Decision Processes., , and . ATVA, volume 12302 of Lecture Notes in Computer Science, page 484-500. Springer, (2020)BOCoSy: Small but Powerful Symbolic Output-Feedback Control., , , , and . HSCC, page 24:1-24:11. ACM, (2022)Prophecy Variables for Hyperproperty Verification., and . CSF, page 471-485. IEEE, (2022)Reactive Synthesis of Smart Contract Control Flows., , , and . ATVA (1), volume 14215 of Lecture Notes in Computer Science, page 248-269. Springer, (2023)AutoHyper: Explicit-State Model Checking for HyperLTL., and . TACAS (1), volume 13993 of Lecture Notes in Computer Science, page 145-163. Springer, (2023)