If an arbitrary counter-party can consume the resource, this can be rephrased as destroying other agent’s utility and this seems to be solved with threat-resistant ROSE values.
Not sure this is a totally correct application, though, because the consumer also gains some utility.
If an arbitrary counter-party can consume the resource, this can be rephrased as destroying other agent’s utility and this seems to be solved with threat-resistant ROSE values.
Not sure this is a totally correct application, though, because the consumer also gains some utility.