Security properties: two agents are sufficient.
Hubert Comon-LundhVéronique CortierPublished in: Sci. Comput. Program. (2004)
Keyphrases
- security properties
- multi agent systems
- multi agent
- formal model
- multiagent systems
- security requirements
- security analysis
- autonomous agents
- security protocols
- intelligent agents
- security vulnerabilities
- dynamic environments
- formal methods
- cryptographic protocols
- artificial intelligence
- data mining techniques
- software engineering