Abstract: | We use Team Automata in order to model a protocol for securing agents in a hostile environment. Our study focuses on privacy properties of the agents. We use the framework to give an alternative proof of a privacy result. As a by-product, our analysis gives some initial insight on the limits of the protocol. From a different perspective, this study continues a line of research on the expressive power and modelling capabilities of Team Automata. To the best of our knowledge, this is the first attempt to use Team Automata for the analysis of privacy properties. |