{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T18:10:21Z","timestamp":1742753421787,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291128"},{"type":"electronic","value":"9783642291135"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29113-5_4","type":"book-chapter","created":{"date-parts":[[2012,3,22]],"date-time":"2012-03-22T17:11:51Z","timestamp":1332436311000},"page":"33-50","source":"Crossref","is-referenced-by-count":2,"title":["Probing Attacks on Multi-Agent Systems Using Electronic Institutions"],"prefix":"10.1007","author":[{"given":"Shahriar","family":"Bijani","sequence":"first","affiliation":[]},{"given":"David","family":"Robertson","sequence":"additional","affiliation":[]},{"given":"David","family":"Aspinall","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1459010.1459011","volume":"10","author":"A. Artikis","year":"2009","unstructured":"Artikis, A., Sergot, M., Pitt, J.: Specifying Norm-Governed Computational Societies. ACM Transactions on Computational Logic\u00a010(1), 1\u201342 (2009)","journal-title":"ACM Transactions on Computational Logic"},{"key":"4_CR2","unstructured":"Esteva, M., De La Cruz, D., Rosell, B., et al.: Engineering open multi-agent systems as electronic institutions. In: Procedings of the National Conference on Artificial Intelligence (AAA 2004), pp. 1010\u20131011. AAAI Press (2004)"},{"key":"4_CR3","unstructured":"Joseph, S., de Pinninck, A.P., Robertson, D., et al.: OpenKnowledge Deliverable 1.1: Interaction Model Language Definition (2006)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-27775-0_29","volume-title":"Logic Programming","author":"D. Robertson","year":"2004","unstructured":"Robertson, D.: Multi-agent Coordination as Distributed Logic Programming. In: Demoen, B., Lifschitz, V. (eds.) ICLP 2004. LNCS, vol.\u00a03132, pp. 416\u2013430. Springer, Heidelberg (2004)"},{"key":"4_CR5","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/11493402_11","volume-title":"Declarative Agent Languages and Technologies II","author":"D. Robertson","year":"2005","unstructured":"Robertson, D.: A Lightweight Coordination Calculus for Agent Systems. In: Leite, J., Omicini, A., Torroni, P., Yolum, p. (eds.) DALT 2004. LNCS (LNAI), vol.\u00a03476, pp. 183\u2013197. Springer, Heidelberg (2005)"},{"issue":"4","key":"4_CR6","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1504\/IJIIDS.2009.030435","volume":"3","author":"G.J. Van\u2019t Noordende","year":"2009","unstructured":"Van\u2019t Noordende, G.J., Overeinder, B.J., Timmer, R.J., et al.: Constructing secure mobile agent systems using the agent operating system. International Journal of Intelligent Information and Database Systems\u00a03(4), 363\u2013381 (2009)","journal-title":"International Journal of Intelligent Information and Database Systems"},{"key":"4_CR7","unstructured":"Endsuleit, R., Wagner, A.: Possible attacks on and countermeasures for secure multi-agent computation. In: Arabnia, H.R., Aissi, S., Mun, Y. (eds.) SAM 2004, pp. 221\u2013227. CSREA Press (2004)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Venkatesan, S., Chellappan, C.: Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP). In: First International Conference on Emerging Trends in Engineering and Technology, pp. 1228\u20131231. IEEE (2008)","DOI":"10.1109\/ICETET.2008.89"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Bijani, S., Robertson, D.: A Review of Attacks and Security Approaches in Open Multi-agent Systems. Artificial Intelligence Review (2012)","DOI":"10.1007\/s10462-012-9343-1"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-87698-4_16","volume-title":"Computer Safety, Reliability, and Security","author":"L. Xiao","year":"2008","unstructured":"Xiao, L., Lewis, P., Dasmahapatra, S.: Secure Interaction Models for the HealthAgents System. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol.\u00a05219, pp. 167\u2013180. Springer, Heidelberg (2008)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Xiao, L., Dasmahapatra, S., Lewis, P., et al.: The design and implementation of a novel security model for HealthAgents. Knowledge Engineering Review\u00a026(2) (2011)","DOI":"10.1017\/S0269888911000117"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-02184-8_19","volume":"221","author":"B. Hu","year":"2009","unstructured":"Hu, B., Dasmahapatra, S., Lewis, P., et al.: Facilitating Knowledge Management in Pervasive Health Care Systems. Networked Knowledge-Networked Media\u00a0221, 285\u2013304 (2009)","journal-title":"Networked Knowledge-Networked Media"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Becker, M.Y.: Information Flow in Credential Systems. In: 23rd IEEE Computer Security Foundations Symposium (CSF), pp. 171\u2013185. IEEE (2010)","DOI":"10.1109\/CSF.2010.19"},{"issue":"1","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R. Milner","year":"1992","unstructured":"Milner, R., Parrow, J., Walker, D.: A Calculus of Mobile Processes.1. Information and Computation\u00a0100(1), 1\u201340 (1992)","journal-title":"Information and Computation"},{"key":"4_CR15","unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance: A Cautionary Note. In: Proceedings of the Second USENIX Workshop on Electronic Commerce, vol.\u00a02, pp. 1\u201311. USENIX Association (1996)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/11563952_30","volume-title":"Advances in Web-Age Information Management","author":"J. Zheng","year":"2005","unstructured":"Zheng, J., Hu, M.-Z.: Intrusion Detection of DoS\/DDoS and Probing Attacks for Web Services. In: Fan, W., Wu, Z., Yang, J. (eds.) WAIM 2005. LNCS, vol.\u00a03739, pp. 333\u2013344. Springer, Heidelberg (2005)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y. Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 463\u2013481. Springer, Heidelberg (2003)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-00306-6_19","volume-title":"Information Security Applications","author":"J.-M. Schmidt","year":"2009","unstructured":"Schmidt, J.-M., Kim, C.: A Probing Attack on AES. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol.\u00a05379, pp. 256\u2013265. Springer, Heidelberg (2009)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Xu, S., Ni, Q., Bertino, E., et al.: A characterization of the problem of secure provenance management. In: IEEE International Conference on Intelligence and Security Informatics, ISI 2009, pp. 310\u2013314. IEEE (2009)","DOI":"10.1109\/ISI.2009.5137332"},{"key":"4_CR20","unstructured":"Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 1\u20135. USENIX Association (2008)"},{"key":"4_CR21","unstructured":"Abian, J., Atencia, M., Besana, P., et al.: OpenKnowledge Deliverable 6.3: Bioinformatics Interaction Models (2008)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Siebes, R., Dupplaw, D., Kotoulas, S., et al.: The openknowledge system: an interaction-centered approach to knowledge sharing. In: Proceedings of the 15th International Conference on Cooperative Information Systems (CoopIS), pp. 381\u2013390 (2007)","DOI":"10.1007\/978-3-540-76848-7_25"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Gurevich, Y., Neeman, I.: DKAL: Distributed-knowledge authorization language. In: IEEE 21st Computer Security Foundations Symposium, CSF 2008, pp. 149\u2013162. IEEE (2008)","DOI":"10.1109\/CSF.2008.8"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Robertson, D., Barker, A., Besana, P., et al.: Models of interaction as a grounding for peer to peer knowledge sharing. In: Advances in Web Semantics I, pp. 81\u2013129 (2009)","DOI":"10.1007\/978-3-540-89784-2_4"},{"issue":"6","key":"4_CR25","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s10207-008-0058-x","volume":"7","author":"J.W. Bryans","year":"2008","unstructured":"Bryans, J.W., Koutny, M., Mazare, L., et al.: Opacity generalised to transition systems. International Journal of Information Security\u00a07(6), 421\u2013435 (2008)","journal-title":"International Journal of Information Security"},{"key":"4_CR26","first-page":"235","volume-title":"Handbook of Logic in Artificial Intelligence and Logic Programming: Logic Programming 5","author":"A.C. Kakas","year":"1998","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: The Role of Abduction in Logic Programming. In: Gabbay, D.M., Hogger, C.J., Robinson, J.A. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming: Logic Programming 5, pp. 235\u2013324. Oxford University Press, USA (1998)"},{"key":"4_CR27","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.entcs.2009.03.015","volume":"236","author":"R. Gorrieri","year":"2009","unstructured":"Gorrieri, R., Martinelli, F., Matteucci, I.: Towards information flow properties for distributed systems. Electronic Notes in Theoretical Computer Science\u00a0236, 65\u201384 (2009)","journal-title":"Electronic Notes in Theoretical Computer Science"}],"container-title":["Lecture Notes in Computer Science","Declarative Agent Languages and Technologies IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29113-5_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T17:57:32Z","timestamp":1742752652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29113-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291128","9783642291135"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29113-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}