Return to Article Details Malicious Agent Detection In Multi Party Data Access Structure Download Download PDF