Systems and methods for checking security goals of a distributed system
are described. In one aspect, detailed security policies are converted
into a model. The detailed security policies are enforced during exchange
of messages between one or more endpoints. The one or more endpoints host
respective principals networked in a distributed operating environment.
The model is evaluated to determine if the detailed security policies
enforce one or more security goals of at least one of the one or more
endpoints.