{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:18:51Z","timestamp":1743077931429},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030205201"},{"type":"electronic","value":"9783030205218"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-20521-8_58","type":"book-chapter","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T19:02:40Z","timestamp":1559674960000},"page":"703-715","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security Testing for Multi-Agent Systems"],"prefix":"10.1007","author":[{"given":"Damas P.","family":"Gruska","sequence":"first","affiliation":[]},{"given":"M. Carmen","family":"Ruiz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,16]]},"reference":[{"key":"58_CR1","unstructured":"Bryans J., Koutny, M., Ryan, P.: Modelling non-deducibility using Petri Nets. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (2004)"},{"key":"58_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/11679219_7","volume-title":"Formal Aspects in Security and Trust","author":"JW Bryans","year":"2006","unstructured":"Bryans, J.W., Koutny, M., Mazar\u00e9, L., Ryan, P.Y.A.: Opacity generalised to transition systems. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2005. LNCS, vol. 3866, pp. 81\u201395. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11679219_7"},{"issue":"3","key":"58_CR3","doi-asserted-by":"publisher","first-page":"321","DOI":"10.3233\/JCS-2007-15302","volume":"15","author":"D Clark","year":"2007","unstructured":"Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying the information flow in a simple imperative programming language. J. Comput. Secur. 15(3), 321\u2013371 (2007)","journal-title":"J. Comput. Secur."},{"key":"58_CR4","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Myers, A.C., Schneider, F.B.: Quantifying information flow with beliefs. J. Comput. Secur., (2009, to appear)","DOI":"10.3233\/JCS-2009-0353"},{"key":"58_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/0304-3975(84)90113-0","volume":"34","author":"R Nicola De","year":"1984","unstructured":"De Nicola, R., Hennessy, M.C.B.: Testing equivalences for processes. Theoret. Comput. Sci. 34, 83\u2013133 (1984)","journal-title":"Theoret. Comput. Sci."},{"key":"58_CR6","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Information flow analysis in a discrete-time process algebra. In: Proceedings of 13th Computer Security Foundation Workshop. IEEE Computer Society Press (2000)"},{"key":"58_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1006\/inco.1995.1123","volume":"121","author":"RJ Glabbeek van","year":"1995","unstructured":"van Glabbeek, R.J., Smolka, S.A., Steffen, B.: Reactive, generative and stratified models of probabilistic processes. Inf. Comput. 121, 59\u201380 (1995)","journal-title":"Inf. Comput."},{"issue":"1\u20133","key":"58_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.scico.2004.01.001","volume":"50","author":"R Gorrieri","year":"2004","unstructured":"Gorrieri, R., Martinelli, F.: A simple framework for real-time cryptographic protocol analysis with compositional proof rules. Sci. Comput. Program. 50(1\u20133), 23\u201349 (2004)","journal-title":"Sci. Comput. Program."},{"key":"58_CR9","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of IEEE Symposium on Security and Privacy (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"58_CR10","unstructured":"Gruska, D.P., Ruiz, M.C.: Opacity-enforcing for process algebras. In: CS&P 2018 (2018)"},{"key":"58_CR11","unstructured":"Gruska, D.P., Ruiz, M.C.: Initial process security. In: Specification and Verification CS&P 2017 (2017)"},{"key":"58_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-662-46823-4_13","volume-title":"Perspectives of System Informatics","author":"DP Gruska","year":"2015","unstructured":"Gruska, D.P.: Process opacity for timed process algebra. In: Voronkov, A., Virbitskaite, I. (eds.) PSI 2014. LNCS, vol. 8974, pp. 151\u2013160. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46823-4_13"},{"issue":"1\u20132","key":"58_CR13","doi-asserted-by":"crossref","first-page":"81","DOI":"10.3233\/FI-2013-934","volume":"128","author":"DP Gruska","year":"2013","unstructured":"Gruska, D.P.: Information flow testing. Fundam. Inf. 128(1\u20132), 81\u201395 (2013)","journal-title":"Fundam. Inf."},{"issue":"3\u20134","key":"58_CR14","doi-asserted-by":"crossref","first-page":"295","DOI":"10.3233\/FI-2012-763","volume":"120","author":"DP Gruska","year":"2012","unstructured":"Gruska, D.P.: Informational analysis of security and integrity. Fundam. Inf. 120(3\u20134), 295\u2013309 (2012)","journal-title":"Fundam. Inf."},{"issue":"3","key":"58_CR15","doi-asserted-by":"crossref","first-page":"281","DOI":"10.3233\/FI-2011-511","volume":"109","author":"DP Gruska","year":"2011","unstructured":"Gruska, D.P.: Gained and excluded private actions by process observations. Fundam. Inf. 109(3), 281\u2013295 (2011)","journal-title":"Fundam. Inf."},{"issue":"1\u20133","key":"58_CR16","doi-asserted-by":"crossref","first-page":"155","DOI":"10.3233\/FI-2009-0094","volume":"93","author":"DP Gruska","year":"2009","unstructured":"Gruska, D.P.: Quantifying security for timed process algebras. Fundam. Inf. 93(1\u20133), 155\u2013169 (2009)","journal-title":"Fundam. Inf."},{"issue":"1\u20134","key":"58_CR17","first-page":"173","volume":"85","author":"DP Gruska","year":"2008","unstructured":"Gruska, D.P.: Probabilistic information flow security. Fundam. Inf. 85(1\u20134), 173\u2013187 (2008)","journal-title":"Fundam. Inf."},{"key":"58_CR18","doi-asserted-by":"crossref","unstructured":"Hansson, H., Jonsson, B.: A calculus for communicating systems with time and probabilities. In: Proceedings of 11th IEEE Real - Time Systems Symposium, Orlando (1990)","DOI":"10.1109\/REAL.1990.128759"},{"key":"58_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-540-24611-4_3","volume-title":"Validation of Stochastic Systems","author":"N L\u00f3pez","year":"2004","unstructured":"L\u00f3pez, N., N\u00fa\u00f1ez, M.: An overview of probabilistic process algebras and their equivalences. In: Baier, C., Haverkort, B.R., Hermanns, H., Katoen, J.-P., Siegle, M. (eds.) Validation of Stochastic Systems. LNCS, vol. 2925, pp. 89\u2013123. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24611-4_3"},{"issue":"2","key":"58_CR20","first-page":"250","volume":"2","author":"R Segala","year":"1995","unstructured":"Segala, R., Lynch, N.: Probabilistic simulations for probabilistic processes. Nord. J. Comput. 2(2), 250\u2013273 (1995)","journal-title":"Nord. J. Comput."},{"key":"58_CR21","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/B978-0-444-89874-6.50010-6","volume-title":"Protocol Specification, Testing and Verification, XII","author":"Wang Yi","year":"1992","unstructured":"Yi, W., Larsen, K.G.: Testing probabilistic and nondeterministic processes. In: Proceeding Proceedings of the IFIP TC6 - WG6.1 (1992)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-20521-8_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,16]],"date-time":"2020-12-16T22:06:48Z","timestamp":1608156408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-20521-8_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030205201","9783030205218"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-20521-8_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"16 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Work-Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gran Canaria","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwann2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwann.uma.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"210","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"150","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"71% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2,9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}