{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:40:14Z","timestamp":1775054414267,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134080","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"633-645","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Verifying Security Policies in Multi-agent Workflows with Loops"],"prefix":"10.1145","author":[{"given":"Bernd","family":"Finkbeiner","sequence":"first","affiliation":[{"name":"CISPA, Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Christian","family":"M\u00fcller","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, M\u00fcnchen, Germany"}]},{"given":"Helmut","family":"Seidl","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, M\u00fcnchen, Germany"}]},{"given":"Eugen","family":"Z\u0103linescu","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, M\u00fcnchen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2009.03.003"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28641-4_6"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594317"},{"key":"e_1_3_2_2_4_1","volume-title":"Information flow control for workflow management systems. it - Information Technology 56, 6","author":"Bauerei\u00df Thomas","year":"2014","unstructured":"Thomas Bauerei\u00df and Dieter Hutter. 2014. Information flow control for workflow management systems. it - Information Technology 56, 6 (2014), 294--299."},{"key":"e_1_3_2_2_5_1","volume-title":"Andrei Popescu, and Franco Raimondi.","author":"Bauerei\u00df Thomas","year":"2017","unstructured":"Thomas Bauerei\u00df, Armando Pesenti Gritti, Andrei Popescu, and Franco Raimondi. 2017. CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees. (2017). to appear in Security and Privacy 2017."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Robert Berger. 1966. The undecidability of the domino problem. Number 66. American Mathematical Soc.","DOI":"10.1090\/memo\/0066"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59207-2"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54792-8_15"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0393"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_2_12_1","volume-title":"Semantics and analysis of business process models in BPMN. Information and Software technology 50, 12","author":"Dijkman Remco M","year":"2008","unstructured":"Remco M Dijkman, Marlon Dumas, and Chun Ouyang. 2008. Semantics and analysis of business process models in BPMN. Information and Software technology 50, 12 (2008), 1281--1294."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27940-9_12"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"R. Fagin J. Y. Halpern Y. Moses and M. Y. Vardi. 1995. Reasoning About Knowledge. MIT Press.","DOI":"10.7551\/mitpress\/5803.001.0001"},{"key":"e_1_3_2_2_15_1","volume-title":"Deciding Hyperproperties. In 27th International Conference on Concurrency Theory (CONCUR 2016) (Leibniz International Proceedings in Informatics (LIPIcs)), Jos\u00e9e Desharnais and Radha Jagadeesan (Eds.)","volume":"59","author":"Finkbeiner Bernd","year":"2016","unstructured":"Bernd Finkbeiner and Christopher Hahn. 2016. Deciding Hyperproperties. In 27th International Conference on Concurrency Theory (CONCUR 2016) (Leibniz International Proceedings in Informatics (LIPIcs)), Jos\u00e9e Desharnais and Radha Jagadeesan (Eds.), Vol. 59. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 13:1--13:14."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46520-3_11"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0168-0072(00)00018-X"},{"key":"e_1_3_2_2_19_1","volume-title":"Software Abstractions: logic, language, and analysis","author":"Jackson Daniel","unstructured":"Daniel Jackson. 2012. Software Abstractions: logic, language, and analysis. MIT press."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2010.08.017"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_11"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46520-3_14"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2661669"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950318"},{"key":"e_1_3_2_2_25_1","volume-title":"The Correctness Problem in Computer Science, Robert S","author":"Manna Zohar","unstructured":"Zohar Manna and Amir Pnueli. 1981. Verification of Concurrent Programs: The Temporal Framework. In The Correctness Problem in Computer Science, Robert S. Boyer and J Strother Moore (Eds.). Academic Press, London, 215--273."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856936"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30885-7_10"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.15"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3828.3837"},{"key":"e_1_3_2_2_30_1","volume-title":"Proc. 9th National Computer Security Conference. DTIC Document, 175--183","author":"Sutherland David","year":"1986","unstructured":"David Sutherland. 1986. A model of information. In Proc. 9th National Computer Security Conference. DTIC Document, 175--183."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-2356-0_11"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02959-2_10"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212703"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":33,"alternative-id":["10.1145\/3133956.3134080","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134080","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}