Skip to main content

Secure FIPA Compliant Agent Architecture Draft

  • Conference paper
Holonic and Multi-Agent Systems for Manufacturing (HoloMAS 2003)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2744))

  • 712 Accesses

Abstract

This paper deals with introducing general and open security mechanisms into the FIPA (http://www.fipa.org) compliant multi-agent architectures. A general overview of possible security threats and security services (countermeasures) is given first; then additional requirements, our design decisions and points of view concerning fundamental services (confidentiality, authentication, authorization, and integrity) are outlined. Further mentioned services, based on the fundamental ones, can be without concern added to the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashley, P.: Authorization for a large heterogeneous multi-domain system. In: Australian Unix and Open Systems Group National Conference (1997)

    Google Scholar 

  2. Ashley, P., Broom, B.: Survey of secure multi-domain distributed architectures. Technical Report FIT-TR-97-08, FIT (1997)

    Google Scholar 

  3. Homburg, P.C.: The architecture of a Worldwide distributed system. PhD thesis, Vrije Universiteit (2001)

    Google Scholar 

  4. http://www.fipa.org

  5. Jansen, W.A.: Mobile agents and security. Special publication, pp. 800–19. Institute of standards and Technology (1999)

    Google Scholar 

  6. Kerberos - http://web.mit.edu/kerberos

  7. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication, RFC2104 (1997)

    Google Scholar 

  8. Krintz, C.: Security in agent-based computing environment using existing tools: A survey

    Google Scholar 

  9. Neuman, B.C.: Proxy-based authorization and accounting for distributed systems. In: Proceedings of the 1993 PSRG workshop on network and distributed system security (1993)

    Google Scholar 

  10. Schneier, B.: Applied cryptography. John Willey & Sons, Chichester (1996)

    Google Scholar 

  11. SESAME - http://www.cosic.esat.kuleuven.ac.be/sesame

  12. Stallings, W.: Cryptography and network security. Principles and practice. Prentice Hall, Englewood Cliffs (1999)

    Google Scholar 

  13. Vlcek, T., Zach, J.: Considerations on secure FIPA compliant agent architecture. In: Marik, V., Camarinha-Matos, L.M., Afsarmanesh, H. (eds.) Proc. of IEEE/IFIP International Conference on Information Technology for Balanced Automation Systems in Manufacturing and Services (BASYS 2002), pp. 11–124. Kluwer Academic Publishers, Dordrecht (2002)

    Google Scholar 

  14. Vlcek, T., Zach, J.: A survey of security approaches in distributed and multi-agent systems. Technical report CC-2002, CertiCon a.s (2002)

    Google Scholar 

  15. Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the TAOS operating system. SRC research report 117, Digital systems research center (1993)

    Google Scholar 

  16. Wong, H.C., Sycara, K.: Adding security and trust to multi-agent systems. In: Proceedings of autonomous agents 1999 Workshop on deception, fraud, and trust in agent societies (1999)

    Google Scholar 

  17. Wulf, W.A., Wang, C., Kienzle, D.: A new model of security for distributed systems. CS technical report CS-95-34, University of Virginia (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vlcek, T., Zach, J. (2003). Secure FIPA Compliant Agent Architecture Draft. In: Mařík, V., McFarlane, D., Valckenaers, P. (eds) Holonic and Multi-Agent Systems for Manufacturing. HoloMAS 2003. Lecture Notes in Computer Science(), vol 2744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45185-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45185-3_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40751-5

  • Online ISBN: 978-3-540-45185-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics