Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
423090 | Electronic Notes in Theoretical Computer Science | 2006 | 17 Pages |
Abstract
We use Team Automata in order to model a protocol by Cachin et al. for securing agents in a hostile environment. Our study focuses on privacy properties of the agents. We use the framework to prove a result from the work by Cachin et al. As a by-product, our analysis gives some initial insight on the limits of the protocol. From a different perspective, this study continues a line of research on the expressive power and modelling capabilities of Team Automata. To the best of our knowledge, this is the first attempt to use Team Automata for the analysis of privacy properties.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics