TABLEAUX 2011 Workshops , Tutorials , and Short Papers

نویسنده

  • Martin Giese
چکیده

In security and compliance, it is often necessary to ensure that agents and systems comply to complex policies. An example of such a policy from financial reporting is the requirement that every transaction t of a customer c, who has within the last 30 days been involved in a suspicious transaction t′, must be reported as suspicious within 2 days. In this talk, I will give an overview of our approach to automated compliance checking. In particular, I will present our monitoring algorithm for checking properties specified in a fragment of metric first-order temporal logic. I will also report on case studies in security and compliance monitoring and use these to evaluate both the suitability of this fragment for expressing complex, realistic policies and the efficiency of the monitoring algorithm. Joint work with David Basin, Matúš Harvan, Samuel Müller, and Eugen Zălinescu.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TEX training through spoken tutorials

Spoken Tutorials, a combination of screencast and voice over, are meant for self-learning of free and open source software (FOSS) systems. The pedagogy involved in creating spoken tutorials for LTEX is explained. A checklist, instructions for conductors and activity-based instructions for learners, along with the spoken tutorial are what is needed to conduct the two hour SELF FOSS Study Worksho...

متن کامل

Shorter Fixed Point Combinators with WALDMEISTER and the Kernel Strategy

From the AAR President Shorter Fixed Point Combinators with WALDMEISTER and the Kernel Strategy Generation of NAFILs of Order 7 News from CADE Inc. CADE Elections CADE-17 Workshops Call for Papers FTP’2000 Call for Problem Sets Calls for Papers AiML-ICTL 2000 ADG New Books Term Rewriting and All That A Fascinating Country in the World of Computing TPTP Library Announcements The TPTP Problem Lib...

متن کامل

A Decade of Database Research Publications

ABSTRACT We analyze the database research publications of four major core database technology conferences (SIGMOD, VLDB, ICDE, EDBT), two main theoretical database conferences (PODS, ICDT) and three database journals (TODS, VLDB Journal, TKDE) over a period of 10 years (2001 2010). Our analysis considers only regular papers as we do not include short papers, demo papers, posters, tutorials or p...

متن کامل

Aamas 2008

The International Conference on Autonomous Agents and Multiagent Systems (AAMAS) is the leading scientific conference for research in autonomous agents and multi-agent systems. The AAMAS conference series was initiated in 2002 as a merger of three highly respected individual conferences: the International Conference in Autonomous Agents, the International Workshop on Agent Theories, Architectur...

متن کامل

Machine Learning for Signal Processing

The 25th MLSP workshop in the series of workshops organized by the IEEE Signal Processing Society MLSP Technical Committee will present the most recent and exciting advances in machine learning for signal processing through keynote talks, tutorials, as well as special and regular single-track sessions. Prospective authors are invited to submit papers on relevant algorithms and applications incl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011