IIT Home Page CNR Home Page

Modelling a secure agent with team automata

We use Team Automata in order to model a protocol by Cachin et al. for securing agents in a hostile environment. Our study focuses on privacy properties of the agents. We use the framework to prove a result from the work by Cachin et al. As a by-product, our analysis gives some initial insight on the limits of the protocol. From a different perspective, this study continues a line of research on the expressive power and modelling capabilities of Team Automata. To the best of our knowledge, this is the first attempt to use Team Automata for the analysis of privacy properties. Titolo Rivista: Electronic Notes in Theoretical Computer Science

Electronic Notes in Theoretical Computer Science, 2006

Authors: L. Egidi, M. Petrocchi
IIT authors:

Type: Article in non-ISI Journal with international referees
Field of reference: Computer Science and Engineering
Da pagina 111 a pagina 127

Activity: Metodi formali per la sicurezza di sistemi ICT