References

References#

  1. Cedric Bonhomme, Christophe Feltus, and Djamel Khadraoui. A multi-agent based decision mechanism for incident reaction in telecommunication network. In Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010, AICCSA '10, 1–2. USA, 2010. IEEE Computer Society. URL: https://doi.org/10.1109/AICCSA.2010.5587036, doi:10.1109/AICCSA.2010.5587036.

  2. Cedric Bonhomme, Christophe Feltus, and Michaël Petit. Dynamic responsibilities assignment in critical electronic institutions - a context-aware solution for in crisis access right management. In Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, ARES '11, 248–253. USA, 2011. IEEE Computer Society. URL: https://doi.org/10.1109/ARES.2011.43, doi:10.1109/ARES.2011.43.

  3. Guy Guemkam, Christophe Feltus, Pierre Schmitt, Cedric Bonhomme, Djamel Khadraoui, and Zahia Guessoum. Reputation based dynamic responsibility to agent assignement for critical infrastructure. In Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02, WI-IAT '11, 272–275. USA, 2011. IEEE Computer Society. URL: https://doi.org/10.1109/WI-IAT.2011.194, doi:10.1109/WI-IAT.2011.194.

  4. Moussa Ouedraogo, Haralambos Mouratidis, Artur Hecker, Cédric Bonhomme, Djamel Khadraoui, Eric Dubois, and David Preston. A new approach to evaluating security assurance. In 7th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011, 215–221. IEEE, 2011. URL: https://doi.org/10.1109/ISIAS.2011.6122822, doi:10.1109/ISIAS.2011.6122822.

  5. Javier Palanca, Andrés Terrasa, Vicente Julian, and Carlos Carrascosa. Spade 3: supporting the new generation of multi-agent systems. IEEE Access, 8():182537–182549, 2020. doi:10.1109/ACCESS.2020.3027357.

  6. Pierre Schmitt, Cédric Bonhomme, Jocelyn Aubert, and Benjamin Gâteau. Programming electronic institutions with utopia. In Pnina Soffer and Erik Proper, editors, Information Systems Evolution - CAiSE Forum 2010, Hammamet, Tunisia, June 7-9, 2010, Selected Extended Papers, volume 72 of Lecture Notes in Business Information Processing, 122–135. Springer, 2010. URL: https://doi.org/10.1007/978-3-642-17722-4\_9, doi:10.1007/978-3-642-17722-4\_9.

  7. Cynthia Wagner, Alexandre Dulaunoy, Gérard Wagener, and Andras Iklody. Misp: the design and implementation of a collaborative threat intelligence sharing platform. In Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS '16, 49–56. New York, NY, USA, 2016. Association for Computing Machinery. URL: https://doi.org/10.1145/2994539.2994542, doi:10.1145/2994539.2994542.

  8. Robert Zuccherato, Patrick Cain, Dr. Carlisle Adams, and Denis Pinkas. Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161, August 2001. URL: https://www.rfc-editor.org/info/rfc3161, doi:10.17487/RFC3161.