Abstract
This paper deals with introducing general and open security mechanisms into the FIPA (http://www.fipa.org) compliant multi-agent architectures. A general overview of possible security threats and security services (countermeasures) is given first; then additional requirements, our design decisions and points of view concerning fundamental services (confidentiality, authentication, authorization, and integrity) are outlined. Further mentioned services, based on the fundamental ones, can be without concern added to the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ashley, P.: Authorization for a large heterogeneous multi-domain system. In: Australian Unix and Open Systems Group National Conference (1997)
Ashley, P., Broom, B.: Survey of secure multi-domain distributed architectures. Technical Report FIT-TR-97-08, FIT (1997)
Homburg, P.C.: The architecture of a Worldwide distributed system. PhD thesis, Vrije Universiteit (2001)
Jansen, W.A.: Mobile agents and security. Special publication, pp. 800–19. Institute of standards and Technology (1999)
Kerberos - http://web.mit.edu/kerberos
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication, RFC2104 (1997)
Krintz, C.: Security in agent-based computing environment using existing tools: A survey
Neuman, B.C.: Proxy-based authorization and accounting for distributed systems. In: Proceedings of the 1993 PSRG workshop on network and distributed system security (1993)
Schneier, B.: Applied cryptography. John Willey & Sons, Chichester (1996)
Stallings, W.: Cryptography and network security. Principles and practice. Prentice Hall, Englewood Cliffs (1999)
Vlcek, T., Zach, J.: Considerations on secure FIPA compliant agent architecture. In: Marik, V., Camarinha-Matos, L.M., Afsarmanesh, H. (eds.) Proc. of IEEE/IFIP International Conference on Information Technology for Balanced Automation Systems in Manufacturing and Services (BASYS 2002), pp. 11–124. Kluwer Academic Publishers, Dordrecht (2002)
Vlcek, T., Zach, J.: A survey of security approaches in distributed and multi-agent systems. Technical report CC-2002, CertiCon a.s (2002)
Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the TAOS operating system. SRC research report 117, Digital systems research center (1993)
Wong, H.C., Sycara, K.: Adding security and trust to multi-agent systems. In: Proceedings of autonomous agents 1999 Workshop on deception, fraud, and trust in agent societies (1999)
Wulf, W.A., Wang, C., Kienzle, D.: A new model of security for distributed systems. CS technical report CS-95-34, University of Virginia (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vlcek, T., Zach, J. (2003). Secure FIPA Compliant Agent Architecture Draft. In: Mařík, V., McFarlane, D., Valckenaers, P. (eds) Holonic and Multi-Agent Systems for Manufacturing. HoloMAS 2003. Lecture Notes in Computer Science(), vol 2744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45185-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-45185-3_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40751-5
Online ISBN: 978-3-540-45185-3
eBook Packages: Springer Book Archive