Skip to main content

Verifiable Middleware for Secure Agent Interoperability

  • Conference paper
Formal Approaches to Agent-Based Systems (FAABS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2699))

Included in the following conference series:

Abstract

There is an increasing need, within organizations such as the Department of Defense and NASA, for building distributed applications that are rapidly re-configurable and survivable in the face of attacks and changing mission needs. Existing methods and tools are inadequate to deal with the multitude of challenges posed by application development for systems that may be distributed over multiple physical nodes separated by vast geographical distances. The problem is exacerbated in a hostile and unforgiving environment such as space where, in addition, systems are vulnerable to failures. It is widely believed that intelligent software agents are central to the development of agile, efficient, and robust distributed applications. This paper presents details of agent-based middleware that could be the basis for developing such applications. We pay particular attention to the correctness, survivability, and efficiency of the underlying middleware architecture, and develop a middleware definition language that permits applications to use this infrastructure in a scalable and seamless manner.

This work is sponsored by the Office of Naval Research

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bharadwaj, R.: SINS: a middleware for autonomous agents and secure code mobility. In: Proc. Second International Workshop on Security of Moble Multi-Agent Systems (SEMAS 2002), First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002), Bologna, Italy (July 2002)

    Google Scholar 

  2. Bharadwaj, R.: SOL: A verifiable synchronous language for reactive systems. In: Proc. Synchronous Languages, Applications, and Programming, ETAPS 2002, Grenoble, Prance (April 2002)

    Google Scholar 

  3. Bharadwaj, R.: An infrastructure for secure interoperability of agents. Technical report, Naval Research Laboratory, Washington, DC (to appear)

    Google Scholar 

  4. Bharadwaj, R., et al.: An infrastructure for secure interoperability of agents. In: Proc. Sixth World Multiconference on Systemics, Cybernetics, and Informatics, Orlando, Florida (July 2002)

    Google Scholar 

  5. Bharadwaj, R., Heitmeyer, C.: Model checking complete requirements specifications using abstraction. Automated Software Engineering 6(1) (January 1999)

    Google Scholar 

  6. Cebrowski, A.K., Garstka, J.J.: Network-Centric Warfare: Its origin and future. In: Proc. United States Naval Institute (January 1998)

    Google Scholar 

  7. Dijkstra, E.W.: A Discipline of Programming. Prentice-Hall, Englewood Cliffs (1976)

    MATH  Google Scholar 

  8. Gong, L.: Java Security: Present and near future. IEEE Micro 15(3), 14–19 (1997)

    Article  Google Scholar 

  9. Heitmeyer, C., Kirby, J., Labaw, B., Archer, M., Bharadwaj, R.: Using abstraction and model checking to detect safety violations in requirements specifications. IEEE Transactions on Software Engineering 24(11) (November 1998)

    Google Scholar 

  10. Secretary of Defense, et al.: Network centric warfare. Technical report, Department of Defense (July 2001), http://www.c3i.osd.mil/NCW

  11. Schneider, F.B.: Enforceable security policies. ACM Transactions on Information and System Security 3(1), 30–50 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bharadwaj, R. (2003). Verifiable Middleware for Secure Agent Interoperability. In: Hinchey, M.G., Rash, J.L., Truszkowski, W.F., Rouff, C., Gordon-Spears, D. (eds) Formal Approaches to Agent-Based Systems. FAABS 2002. Lecture Notes in Computer Science(), vol 2699. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45133-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45133-4_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40665-5

  • Online ISBN: 978-3-540-45133-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics