Abstract
We propose an approach for implementing secure mobile agent systems. In the first step, we define a meta-model which extends the UML deployment diagram by concepts related to the security and mobility of multi-agent systems. We propose also a UML profile as an implementation of this meta-model. All defined concepts are based on formal specifications. In the second step, we project the application model in AGLETS-specific model, which describes the structure and the main functionalities of the application using the AGLETS concepts. In the third step, we generate Java skeleton code from the obtained model, and we generate also AspectJ code for enforcing security properties defined in the application model. The generated aspects will be woven, in modular way, into the functional application code.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ugurlu, S., Erdogan, N.: A Flexible Policy Architecture for Mobile Agents. In: Wiedermann, J., Tel, G., Pokorný, J., Bieliková, M., Štuller, J. (eds.) SOFSEM 2006. LNCS, vol. 3831, pp. 538–547. Springer, Heidelberg (2006)
Bryce, C.B.: A Security Framework for a Mobile Agent System. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 273–290. Springer, Heidelberg (2000)
Maria, B.A.D., da Silva, V.T., de Lucena, C.J.P.: Developing Multi-Agent Systems Based on MDA. In: Proceedings of the 17th Conference on Advanced Information Systems Engineering - CAiSE. CEUR Workshop Proceedings, vol. 161. CEUR-WS.org (2005)
Loulou, M., Jmaiel, M., Mosbah, M.: Dynamic Security Framework for Mobile Agent Systems: Specification, Verification and Enforcement. International Journal of Information and Computer Security - IJICS, 321–336 (2009)
Acceleo: Effective MDA (2007), http://www.acceleo.org/
Loulou, M., Kacem, A.H., Jmaiel, M., Mosbah, M.: A Formal Security Framework for Mobile Agent Systems: Specification and Verification. In: Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems, pp. 69–76. IEEE (2008)
Woodcock, J., Davies, J.: Using Z: Specification Refinement and Proof. International Thomson Computer Press (1996)
Meisels, I., Saaltink, M.: The Z/EVES Reference Manual (for Version 1.5). Technical report, ORA Canada (1997)
Rekik, M., Kallel, S., Loulou, M., Kacem, A.H.: Modeling Secure Mobile Agent Systems. In: Jezic, G., Kusek, M., Nguyen, N.-T., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2012. LNCS, vol. 7327, pp. 330–339. Springer, Heidelberg (2012)
IBM: Aglets (1996), http://www.trl.ibm.com/aglets/
Jouault, F., Kurtev, I.: Transforming Models with ATL. In: Bruel, J.-M. (ed.) MoDELS 2005 Workshops. LNCS, vol. 3844, pp. 128–138. Springer, Heidelberg (2006)
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An Overview of AspectJ. In: Lindskov Knudsen, J. (ed.) ECOOP 2001. LNCS, vol. 2072, pp. 327–353. Springer, Heidelberg (2001)
Beydoun, G., Low, G., Mouratidis, H., Henderson-Sellers, B.: A security-aware metamodel for multi-agent systems (MAS). Information and Software Technology 51, 832–845 (2009)
Beydoun, G., Gonzalez-Perez, C., Henderson-Sellers, B., Low, G.: Developing and Evaluating a Generic Metamodel for MAS Work Products. In: Garcia, A., Choren, R., Lucena, C., Giorgini, P., Holvoet, T., Romanovsky, A. (eds.) SELMAS 2005. LNCS, vol. 3914, pp. 126–142. Springer, Heidelberg (2006)
Mouratidis, H., Giorgini, P.: Secure Tropos: a Security-Oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering 17, 285–309 (2007)
Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET- Secure Agent Communication Model. In: Proceedings of 11th International Conference on Computer and Information Technology - ICCIT, pp. 371–375. IEEE (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kallel, S., Loulou, M., Rekik, M., Kacem, A.H. (2013). MDA-Based Approach for Implementing Secure Mobile Agent Systems. In: Müller, J.P., Cossentino, M. (eds) Agent-Oriented Software Engineering XIII. AOSE 2012. Lecture Notes in Computer Science, vol 7852. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39866-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-39866-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39865-0
Online ISBN: 978-3-642-39866-7
eBook Packages: Computer ScienceComputer Science (R0)