{"id":"https://openalex.org/W2893316171","doi":"https://doi.org/10.15439/2018f262","title":"Applying Formal Methods to Specify Security Requirements in Multi\u2013Agent Systems","display_name":"Applying Formal Methods to Specify Security Requirements in Multi\u2013Agent Systems","publication_year":2018,"publication_date":"2018-09-26","ids":{"openalex":"https://openalex.org/W2893316171","doi":"https://doi.org/10.15439/2018f262","mag":"2893316171"},"language":"en","primary_location":{"id":"doi:10.15439/2018f262","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2018f262","pdf_url":"https://annals-csis.org/proceedings/2018/drp/pdf/262.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/2018/drp/pdf/262.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102897875","display_name":"Vinitha Hannah Subburaj","orcid":"https://orcid.org/0000-0003-3496-373X"},"institutions":[{"id":"https://openalex.org/I188674872","display_name":"West Texas A&M University","ror":"https://ror.org/04gnp7x40","country_code":"US","type":"education","lineage":["https://openalex.org/I188674872"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vinitha Hannah Subburaj","raw_affiliation_strings":["School of Engineering, Computer Science and Mathematics WTAMU Box 60767 West Texas A&M University Canyon, TX 79016 USA"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Computer Science and Mathematics WTAMU Box 60767 West Texas A&M University Canyon, TX 79016 USA","institution_ids":["https://openalex.org/I188674872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111611257","display_name":"Joseph E. Urban","orcid":null},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joseph E. Urban","raw_affiliation_strings":["Arizona State University Tempe, AZ 85281 USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University Tempe, AZ 85281 USA","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102897875"],"corresponding_institution_ids":["https://openalex.org/I188674872"],"apc_list":null,"apc_paid":null,"fwci":2.2923,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.90616967,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"15","issue":null,"first_page":"707","last_page":"714"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7243533730506897},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.5972757339477539},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5014443397521973},{"id":"https://openalex.org/keywords/formal-specification","display_name":"Formal specification","score":0.4572997987270355},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35077816247940063},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3460162878036499},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20810741186141968}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7243533730506897},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.5972757339477539},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5014443397521973},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.4572997987270355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35077816247940063},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3460162878036499},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20810741186141968}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.15439/2018f262","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2018f262","pdf_url":"https://annals-csis.org/proceedings/2018/drp/pdf/262.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:60a72cfee3aa4e8b82d151ab9a0cb2ac","is_oa":true,"landing_page_url":"https://doaj.org/article/60a72cfee3aa4e8b82d151ab9a0cb2ac","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Annals of computer science and information systems, Vol 15, Pp 707-714 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.15439/2018f262","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2018f262","pdf_url":"https://annals-csis.org/proceedings/2018/drp/pdf/262.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2893316171.pdf","grobid_xml":"https://content.openalex.org/works/W2893316171.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W1482235705","https://openalex.org/W1524147119","https://openalex.org/W1549629574","https://openalex.org/W1968941413","https://openalex.org/W1984500184","https://openalex.org/W2002639138","https://openalex.org/W2007231177","https://openalex.org/W2081105739","https://openalex.org/W2096178388","https://openalex.org/W2098812780","https://openalex.org/W2116626663","https://openalex.org/W2127221278","https://openalex.org/W2137073376","https://openalex.org/W2153281196","https://openalex.org/W2153966110","https://openalex.org/W2158572645","https://openalex.org/W2166130341","https://openalex.org/W2199936321","https://openalex.org/W2395994884","https://openalex.org/W2399345027","https://openalex.org/W2430131036","https://openalex.org/W2483868937","https://openalex.org/W2513506956","https://openalex.org/W2616346152","https://openalex.org/W4239434897","https://openalex.org/W4244599175","https://openalex.org/W4285719527","https://openalex.org/W6650865980","https://openalex.org/W6652102791","https://openalex.org/W6675031395","https://openalex.org/W6682271308","https://openalex.org/W6684324479","https://openalex.org/W6687681350","https://openalex.org/W6726097788"],"related_works":["https://openalex.org/W1524361563","https://openalex.org/W2072697836","https://openalex.org/W1988166986","https://openalex.org/W2132815515","https://openalex.org/W2118077887","https://openalex.org/W1571738907","https://openalex.org/W1559122068","https://openalex.org/W61995002","https://openalex.org/W1911633385","https://openalex.org/W2117700306"],"abstract_inverted_index":{"Security":[0],"has":[1,90,169,182],"become":[2],"an":[3,36],"important":[4],"concern":[5],"with":[6,207],"the":[7,20,27,82,107,132,160,189,197,208,213,226,234],"development":[8,28,108,136,198],"of":[9,19,29,85,135,139,149,162,192,202,228],"large":[10,86],"scale":[11,87],"distributed":[12],"and":[13,47,55,159],"heterogeneous":[14],"multi-agent":[15],"systems":[16,44,89,181],"(MAS).":[17],"One":[18],"main":[21],"problems":[22],"in":[23,92,106,130,137,196,231],"addressing":[24],"security":[25,33,63,112,122,140,150,167,190,210,229],"during":[26,131],"MAS":[30,193,203,232],"is":[31,34,51,222],"that":[32],"often":[35],"afterthought.":[37],"The":[38],"cost":[39,71],"involved":[40],"to":[41,67,80,110,120,142,156,165,187,224],"patch":[42],"existing":[43,154],"against":[45],"vulnerabilities":[46],"attacks":[48],"after":[49],"deployment":[50],"high.":[52],"If":[53],"developers":[54],"designers":[56],"can":[57,72],"spend":[58],"some":[59],"quality":[60],"time":[61],"investigating":[62],"aspects":[64],"before":[65],"beginning":[66],"code":[68],"then":[69],"this":[70,146],"be":[73,143],"reduced":[74],"significantly.":[75],"Also,":[76],"using":[77,102,212,233],"formal":[78,103,163,175],"methods":[79,104,164],"specify":[81,111,166],"complex":[83],"behavior":[84],"software":[88,94],"resulted":[91],"reliable":[93],"systems.":[95],"This":[96],"research":[97],"effort":[98],"was":[99],"focused":[100],"on":[101,195],"early":[105,133,194],"lifecycle":[109],"requirements":[113,151,168,191,211,230],"for":[114,152,178],"MAS.":[115],"New":[116],"solutions":[117,155],"are":[118,204],"emerging":[119],"fix":[121],"related":[123],"issues,":[124],"but":[125],"how":[126],"much":[127],"thought":[128],"gets":[129],"phases":[134],"terms":[138],"needs":[141],"answered.":[144],"In":[145],"paper,":[147],"analysis":[148],"MAS,":[153,158],"secure":[157],"use":[161],"been":[170,183],"studied.":[171],"Descartes":[172,214,235],"-Agent,":[173],"a":[174],"specification":[176,216,227],"language":[177],"specifying":[179],"agent":[180],"taken":[184],"into":[185],"study":[186,220],"model":[188],"process.":[199],"Functional":[200],"specifications":[201],"modelled":[205],"along":[206],"non-functional":[209],"-Agent":[215],"language.":[217],"A":[218],"case":[219],"example":[221],"used":[223],"illustrate":[225],"-Agent.":[236]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
