Abstract
A challenging problem to solve to take full advantage of the benefits of mobile agent (MA) technology is to overcome security problems. In fact, in most cases, the security aspects are taken into account on the implementation stage of software development process, which may lead to the negligence of several aspects of security. However, including security properties in the design stage could lead to the development of a more secure MA system, especially that current MA platforms do not cover all security criteria. In this paper, we present a detailed modelling of security properties related to the security of mobile agents, stationary agents and places. The proposed model allows taking into account the security aspect earlier on the software development process and also it can be a first step to help researchers ameliorating security level on MA platforms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mouratidis, H., Giorgini, P., Manson, G.: Modelling secure multiagent systems. In: AAMAS 2003 Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, Melbourne, Australia, 14–18 July 2003
Samet, D., Ktata, F.B., Ghedira, K.: Security and trust on mobile agent platforms: a survey. In: KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, Vilamoura, Portugal (2017)
Jansen, W., Karygiannis, T.: Mobile Agent Security. NiST Special Publication 800-19 (2000)
Alfalayleh, M., Brankovic, L.: An overview of security issues and techniques in mobile agents. In: Conference on Communications and Multimedia Security. University of Newcastle, Australia (2004)
Hachicha, H., Samet, D., Ghedira, K.: A conceptual approach to place security in systems of mobile agents. In: 13th German Conference, MATES 2015, Cottbus, Germany, 28–30 September 2015
Loulou, M., Jmaiel, M., Hadj Kacem, A., Mosbah, M.: A conceptual model for secure mobile agent systems. In: International Conference on Computational Intelligence and Security, Guangzhou, China (2006)
Ma, L., Tsai, J.: Formal modeling and analysis of a secure mobile-agent system. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 38(1), 180–196 (2008)
Rekik, M., Kallel, S., Loulou, M., Hadj Kacem, A.: Modeling secure mobile agent systems. In: KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, Dubrovnik, Croatia (2012)
Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285–309 (2007)
Huget, M.-P.: Nemo: an agent-oriented software engineering methodology. In: OOPSLA Workshop on Agent Oriented Methodologies, Seattle (2002)
Jürjens, J.: UMLsec: extending UML for secure systems development. In: International Conference on the Unified Modeling Language, Dresden, Germany (2002)
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: International Conference on the Unified Modeling Language, Dresden, Germany (2002)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE J. Mag. 29(2), 38–47 (1996)
Xiao, L., Peet, A., Lewis, P., Dashmapatra, S., Saez, C., Croitoru, M., Vicente, J., Gonzalez-Velez, H., Ariet, M.L.I.: An adaptive security model for multi-agent systems and application to a clinical trials environment. In: IEEE Annual International Computer Software and Applications Conference Volume II, pp. 261–268. IEEE Computer Society (2007)
Beydoun, G., Low, G.C., Mouratidis, H., Henderson-Sellers, B.: Modelling MAS_specific security features. In: International Conference on Advanced Information Systems Engineering, Trondheim, Norway (2007)
Beydoun, G., Low, G.C., Mouratidis, H., Henderson-Sellers, B.: A security-aware metamodel for multi-agent systems (MAS). Inf. Softw. Technol. 51(5), 832–845 (2009)
Zrari, C., Hachicha, H., Ghedira, K.: Agent’s security during communication in mobile agents system. In: KES 2015, Singapore (2015)
Hachicha, H., Loukil, A., Ghedira, K.: MA-UML: a conceptual approach for mobile agents’ modelling. Int. J. Agent-Oriented Softw. Eng. 3(2/3), 277–305 (2009)
Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: JADE: a software framework for developing multi-agent applications. Lessons learned. Inf. Softw. Technol. 50(1-2), 10–21 (2008)
Jade Security Guide (2005). http://jade.cselt.it/doc/tutorials/JADE_Security.pdf. Accessed 05 Dec 2017
http://jade.tilab.com/doc/tutorials/PKI_Guide.pdf. Accessed 05 Dec 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Samet, D., Ktata, F.B., Ghedira, K. (2019). Securing Mobile Agents, Stationary Agents and Places in Mobile Agents Systems. In: Jezic, G., Chen-Burger, YH., Howlett, R., Jain, L., Vlacic, L., Å perka, R. (eds) Agents and Multi-Agent Systems: Technologies and Applications 2018. KES-AMSTA-18 2018. Smart Innovation, Systems and Technologies, vol 96. Springer, Cham. https://doi.org/10.1007/978-3-319-92031-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-92031-3_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-92030-6
Online ISBN: 978-3-319-92031-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)