{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T16:45:10Z","timestamp":1762101910319,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T00:00:00Z","timestamp":1472428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Grantov\u00e1 Agentura \u010cesk\u00e9 Republiky","award":["15-20433Y"],"award-info":[{"award-number":["15-20433Y"]}]},{"name":"Czech Science Foundation","award":["15-20433Y"],"award-info":[{"award-number":["15-20433Y"]}]},{"name":"Grant Agency of the CTU in Prague","award":["SGS14\/202\/OHK3\/3T\/13"],"award-info":[{"award-number":["SGS14\/202\/OHK3\/3T\/13"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,29]]},"DOI":"10.1145\/2970030.2970042","type":"proceedings-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T12:32:08Z","timestamp":1472646728000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Secure Multi-Agent Planning"],"prefix":"10.1145","author":[{"given":"Michal","family":"\u0160tolba","sequence":"first","affiliation":[{"name":"Dept. of Computer Science, Faculty of Electrical Engineering, Czech Technical University in Prague, Czech Republic"}]},{"given":"Jan","family":"To\u017ei\u010dka","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science, Faculty of Electrical Engineering, Czech Technical University in Prague, Czech Republic"}]},{"given":"Anton\u00edn","family":"Komenda","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science, Faculty of Electrical Engineering, Czech Technical University in Prague, Czech Republic"}]}],"member":"320","published-online":{"date-parts":[[2016,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1530","volume-title":"Procs. of the IJCAI'15","author":"Brafman R. I.","year":"2015"},{"key":"e_1_3_2_1_2_1","first-page":"28","volume-title":"Procs. of the ICAPS'08","author":"Brafman R. I.","year":"2008"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.07.085"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3090475.3090491"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Procs. of the AAMAS'16","author":"Maliah S.","year":"2016"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2750423.2750431"},{"key":"e_1_3_2_1_7_1","unstructured":"G. Smith. On the foundations of quantitative information flow. In Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures FOSSACS Held as Part of the Joint European Conferences on Theory and Practice of Software ETAPS pages 288--302 2009.  G. Smith. On the foundations of quantitative information flow. In Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures FOSSACS Held as Part of the Joint European Conferences on Theory and Practice of Software ETAPS pages 288--302 2009."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0540-2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5220\/0004918701780189"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"KAIS","author":"To\u017ei\u010dka J.","year":"2015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1735317.1735320"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"}],"event":{"name":"PrAISe '16: International Workshop on AI for Privacy and Security","acronym":"PrAISe '16","location":"The Hague Netherlands"},"container-title":["Proceedings of the 1st International Workshop on AI for Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970042","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970030.2970042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,29]]},"references-count":12,"alternative-id":["10.1145\/2970030.2970042","10.1145\/2970030"],"URL":"https:\/\/doi.org\/10.1145\/2970030.2970042","relation":{},"subject":[],"published":{"date-parts":[[2016,8,29]]},"assertion":[{"value":"2016-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}