<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
doi: 10.1109/pdcat.2007.77 , 10.1109/pdcat.2007.83 , 10.1109/pdcat.2007.4420175 , 10.1109/pdcat.2007.4420172 , 10.1109/pdcat.2007.4420171 , 10.1109/pdcat.2007.53 , 10.1109/pdcat.2007.4420158 , 10.1109/pdcat.2007.48 , 10.1109/pdcat.2007.79 , 10.1109/pdcat.2007.4420159 , 10.1109/pdcat.2007.4420197 , 10.1109/pdcat.2007.31 , 10.1109/pdcat.2007.56 , 10.1109/pdcat.2007.4420212 , 10.1109/pdcat.2007.4420184 , 10.1109/pdcat.2007.4420201 , 10.1109/pdcat.2007.43 , 10.1109/pdcat.2007.4420206 , 10.1109/pdcat.2007.4 , 10.1109/pdcat.2007.68 , 10.1109/pdcat.2007.22 , 10.1109/pdcat.2007.4420176 , 10.1109/pdcat.2007.47 , 10.1109/pdcat.2007.24 , 10.1109/pdcat.2007.4420195 , 10.25916/sut.26291197 , 10.25916/sut.26291197.v1
handle: 11541.2/113219 , 1959.8/48410
doi: 10.1109/pdcat.2007.77 , 10.1109/pdcat.2007.83 , 10.1109/pdcat.2007.4420175 , 10.1109/pdcat.2007.4420172 , 10.1109/pdcat.2007.4420171 , 10.1109/pdcat.2007.53 , 10.1109/pdcat.2007.4420158 , 10.1109/pdcat.2007.48 , 10.1109/pdcat.2007.79 , 10.1109/pdcat.2007.4420159 , 10.1109/pdcat.2007.4420197 , 10.1109/pdcat.2007.31 , 10.1109/pdcat.2007.56 , 10.1109/pdcat.2007.4420212 , 10.1109/pdcat.2007.4420184 , 10.1109/pdcat.2007.4420201 , 10.1109/pdcat.2007.43 , 10.1109/pdcat.2007.4420206 , 10.1109/pdcat.2007.4 , 10.1109/pdcat.2007.68 , 10.1109/pdcat.2007.22 , 10.1109/pdcat.2007.4420176 , 10.1109/pdcat.2007.47 , 10.1109/pdcat.2007.24 , 10.1109/pdcat.2007.4420195 , 10.25916/sut.26291197 , 10.25916/sut.26291197.v1
handle: 11541.2/113219 , 1959.8/48410
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages of software development. However, there is no formal way provided for software developers to find out what makes a communication protocol secure and what are secure designs. In this paper we propose a method that defines security requirements, bridges security requirement analysis with security design, and integrates the security techniques into a communication protocol to fulfill the security requirements.
Time estimations, Risk perception, Information retrieval systems, 1020 Informatik, Distributed queries, 102010 Datenbanksysteme, 102010 Database systems, 1020 Computer Sciences, Placement methods
Time estimations, Risk perception, Information retrieval systems, 1020 Informatik, Distributed queries, 102010 Datenbanksysteme, 102010 Database systems, 1020 Computer Sciences, Placement methods
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 43 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |