4 research outputs found

    A survey of security issue in multi-agent systems

    Get PDF
    Multi-agent systems have attracted the attention of researchers because of agents' automatic, pro-active, and dynamic problem solving behaviors. Consequently, there has been a rapid development in agent technology which has enabled us to provide or receive useful and convenient services in a variety of areas such as banking, transportation, e-business, and healthcare. In many of these services, it is, however, necessary that security is guaranteed. Unless we guarantee the security services based on agent-based systems, these services will face significant deployment problems. In this paper, we survey existing work related to security in multi-agent systems, especially focused on access control and trust/reputation, and then present our analyses. We also present existing problems and discuss future research challenges. © Springer Science+Business Media B.V 2011

    Advances in infrastructures and tools for multiagent systems

    Full text link
    In the last few years, information system technologies have focused on solving challenges in order to develop distributed applications. Distributed systems can be viewed as collections of service-provider and ser vice-consumer components interlinked by dynamically defined workflows (Luck and McBurney 2008).Alberola Oltra, JM.; Botti Navarro, VJ.; Such Aparicio, JM. (2014). Advances in infrastructures and tools for multiagent systems. Information Systems Frontiers. 16:163-167. doi:10.1007/s10796-014-9493-6S16316716Alberola, J. M., Búrdalo, L., Julián, V., Terrasa, A., & García-Fornes, A. (2014). An adaptive framework for monitoring agent organizations. Information Systems Frontiers, 16(2). doi: 10.1007/s10796-013-9478-x .Alfonso, B., Botti, V., Garrido, A., & Giret, A. (2014). A MAS-based infrastructure for negotiation and its application to a water-right market. Information Systems Frontiers, 16(2). doi: 10.1007/s10796-013-9443-8 .Andrighetto, G., Castelfranchi, C., Mayor, E., McBreen, J., López-Sánchez, M., & Parsons, S. (2013). (Social) norm dynamics. In G. Andrighetto, G. Governatori, P. Noriega, & L. W. van der Torre (Eds.), Normative multi-agent systems (pp. 135–170). Dagstuhl: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik.Baarslag, T., Fujita, K., Gerding, E. H., Hindriks, K., Ito, T., Jennings, N. R., et al. (2013). Evaluating practical negotiating agents: results and analysis of the 2011 international competition. Artificial Intelligence, 198, 73–103.Boissier, O., Bordini, R. H., Hübner, J. F., Ricci, A., & Santi, A. (2013). Multi-agent oriented programming with JaCaMo. Science of Computer Programming, 78(6), 747–761.Campos, J., Esteva, M., López-Sánchez, M., Morales, J., & Salamó, M. (2011). Organisational adaptation of multi-agent systems in a peer-to-peer scenario. Computing, 91(2), 169–215.Carrera, A., Iglesias, C. A., & Garijo, M. (2014). Beast methodology: an agile testing methodology for multi-agent systems based on behaviour driven development. Information Systems Frontiers, 16(2). doi: 10.1007/s10796-013-9438-5 .Criado, N., Such, J. M., & Botti, V. (2014). Norm reasoning services. Information Systems Frontiers, 16(2). doi: 10.1007/s10796-013-9444-7 .Del Val, E., Rebollo, M., & Botti, V. (2014). Enhancing decentralized service discovery in open service-oriented multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems, 28(1), 1–30.Denti, E., Omicini, A., & Ricci, A. (2002). Coordination tools for MAS development and deployment. Applied Artificial Intelligence, 16(9–10), 721–752.Dignum, V., & Dignum, F. (2012). A logic of agent organizations. Logic Journal of IGPL, 20(1), 283–316.Ferber, J., & Gutknecht, O. (1998). A meta-model for the analysis and design of organizations in multi-agent systems. In Multi agent systems. Proceedings. International Conference on (pp. 128–135). IEEE.Fogués, R. L., Such, J. M., Espinosa, A., & Garcia-Fornes, A. (2014). BFF: a tool for eliciting tie strength and user communities in social networking services. Information Systems Frontiers, 16(2). doi: 10.1007/s10796-013-9453-6 .Garcia, E., Giret, A., & Botti, V. (2011). Evaluating software engineering techniques for developing complex systems with multiagent approaches. Information and Software Technology, 53(5), 494–506.Garcia-Fornes, A., Hübner, J., Omicini, A., Rodriguez-Aguilar, J., & Botti, V. (2011). Infrastructures and tools for multiagent systems for the new generation of distributed systems. Engineering Applications of Articial Intelligence, 24(7), 1095–1097.Jennings, N., Faratin, P., Lomuscio, A., Parsons, S., Sierra, C., & Wooldridge, M. (2001). Automated negotiation: prospects, methods and challenges. International Journal of Group Decision and Negotiation, 10(2), 199–215.Jung, Y., Kim, M., Masoumzadeh, A., & Joshi, J. B. (2012). A survey of security issue in multi-agent systems. Artificial Intelligence Review, 37(3), 239–260.Kota, R., Gibbins, N., & Jennings, N. R. (2012). Decentralized approaches for self-adaptation in agent organizations. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 7(1), 1.Kraus, S. (1997). Negotiation and cooperation in multi-agent environments. Artificial Intelligence, 94(1), 79–97.Lin, Y. I., Chou, Y. W., Shiau, J. Y., & Chu, C. H. (2013). Multi-agent negotiation based on price schedules algorithm for distributed collaborative design. Journal of Intelligent Manufacturing, 24(3), 545–557.Luck, M., & McBurney, P. (2008). Computing as interaction: agent and agreement technologies.Luck, M., McBurney, P., Shehory, O., & Willmott, S. (2005). Agent technology: Computing as interaction (A roadmap for agent based computing). AgentLink.Ossowski, S., & Menezes, R. (2006). On coordination and its significance to distributed and multiagent systems. Concurrency and Computation: Practice and Experience, 18(4), 359–370.Ossowski, S., Sierra, C., & Botti. (2013). Agreement technologies: A computing perspective. In Agreement Technologies (pp. 3–16). Springer Netherlands.Pinyol, I., & Sabater-Mir, J. (2013). Computational trust and reputation models for open multi-agent systems: a review. Artificial Intelligence Review, 40(1), 1–25.Ricci, A., Piunti, M., & Viroli, M. (2011). Environment programming in multi-agent systems: an artifact-based perspective. Autonomous Agents and Multi-Agent Systems, 23(2), 158–192.Sierra, C., & Debenham, J. (2006). Trust and honour in information-based agency. In Proceedings of the 5th international conference on autonomous agents and multi agent systems, (p. 1225–1232). New York: ACM.Sierra, C., Botti, V., & Ossowski, S. (2011). Agreement computing. KI-Knstliche Intelligenz, 25(1), 57–61.Vasconcelos, W., García-Camino, A., Gaertner, D., Rodríguez-Aguilar, J. A., & Noriega, P. (2012). Distributed norm management for multi-agent systems. Expert Systems with Applications, 39(5), 5990–5999.Wooldridge, M. (2002). An introduction to multiagent systems. New York: Wiley.Wooldridge, M., & Jennings, N. R. (1995). Intelligent agents: theory and practice. Knowledge Engineering Review, 10(2), 115–152

    CRiBAC: Community-centric role interaction based access control model

    Get PDF
    As one of the most efficient solutions to complex and large-scale problems, multi-agent cooperation has been in the limelight for the past few decades. Recently, many research projects have focused on context-aware cooperation to dynamically provide complex services. As cooperation in the multi-agent systems (MASs) becomes more common, guaranteeing the security of such cooperation takes on even greater importance. However, existing security models do not reflect the agents' unique features, including cooperation and context-awareness. In this paper, we propose a Community-based Role interaction-based Access Control model (CRiBAC) to allow secure cooperation in MASs. To do this, we refine and extend our preliminary RiBAC model, which was proposed earlier to support secure interactions among agents, by introducing a new concept of interaction permission, and then extend it to CRiBAC to support community-based cooperation among agents. We analyze potential problems related to interaction permissions and propose two approaches to address them. We also propose an administration model to facilitate administration of CRiBAC policies. Finally, we present the implementation of a prototype system based on a sample scenario to assess the proposed work and show its feasibility. © 2012 Elsevier Ltd. All rights reserved

    BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Get PDF
    Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP) for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool
    corecore