Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
There is a need for agent systems that can scale to realworld applications, yet retain the clean semantic underpinning of more formal agent frameworks. We describe the SRI Procedu...