All Stories

  1. Automatically finding execution scenarios to deploy security-sensitive workflows
  2. Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes