Skip to main content

A Practical Security Infrastructure for Distributed Agent Applications

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8076))

Abstract

Security is a vital feature for most real-world distributed applications. For applications using an agent-based middleware, comprehensive support for many security-related aspects can and should already be provided by the platform in a holistic manner. Moreover, security in practice does not only concern the enforcement of well-known security objectives like authenticity and confidentiality but also requires a simple yet effective usage concept that renders it easy for developers to define their security requirements. In this paper a security concept and implementation for multi-agent systems is introduced, which focuses on external, i.e. inter-platform, security aspects. The solution encompasses a usage concept distinguishing security intents from realization details and allows service providers as well as service clients to impose security constraints on communication relationships. The security concept requirements have been elicited from and the results have been evaluated with a real-world company project in the area of distributed workflow management in business intelligence.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biskup, J., Kern-Isberner, G., Thimm, M.: Towards enforcement of confidentiality in agent interactions. In: Proceedings of the 12th International Workshop on Non-Monotonic Reasoning (NMR 2008), University of New South Wales, Technical Report No. UNSW-CSE-TR-0819, pp. 104–112 (September 2008)

    Google Scholar 

  2. Braubach, L., Pokahr, A.: Developing Distributed Systems with Active Components and Jadex. Scalable Computing: Practice and Experience 13(2), 3–24 (2012)

    Google Scholar 

  3. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. Internet Engineering Task Force (August 2008)

    Google Scholar 

  4. Goichon, F., Salagnac, G., Frénot, S.: Exploiting Java Code Interactions. Technical Report RT-0419, INRIA (December 2011)

    Google Scholar 

  5. Gosling, J., Joy, B., Steele, G., Bracha, G., Buckley, A.: The Java Language Specification, 7th edn. Addison-Wesley Professional, California (2012)

    Google Scholar 

  6. Lee, H., Alves-Foss, J., Harrison, S.: The use of encrypted functions for mobile agent security. In: HICSS, pages 10. IEEE, New York (2004)

    Google Scholar 

  7. Moffett, J.D.: Distributed Systems Security. A. Kent, J.G. Williams 15 (1995)

    Google Scholar 

  8. Nagaraj, S.V.: Securing multi-agent systems: A survey. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing & Inform. Technology. AISC, vol. 176, pp. 23–30. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  9. Neuman, B.C., Ts’o, T.: Kerberos: An authentication service for computer networks. Comm. Mag. 32(9), 33–38 (1994)

    Article  Google Scholar 

  10. NIST. Advanced Encryption Standard (AES) (FIPS PUB 197). National Institute of Standards and Technology (November 2001)

    Google Scholar 

  11. NIST. Underlying Technical Models for Information Technology Security. National Institute of Standards and Technology (Decmeber 2001)

    Google Scholar 

  12. Norman, D.A.: The way i see it: When security gets in the way. Interactions 16(6), 60–63 (2009)

    Article  Google Scholar 

  13. OASIS. Web Services Security: SOAP Message Security 1.1 (February 2006)

    Google Scholar 

  14. Oey, M., Warnier, M., Brazier, F.: Security in Large-Scale Open Distributed Multi- Agent Systems. In: Autonomous Agents, Rijeka, Croatia, pp. 1–27. IN-TECH (2010)

    Google Scholar 

  15. Pokahr, A., Braubach, L.: The active components approach for distributed systems development. International Journal of Parallel, Emergent and Distributed Systems 28(4), 321–369 (2013)

    Article  Google Scholar 

  16. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  17. Vila, X., Schuster, A., Riera, A.: Security for a Multi-Agent System based on JADE. Computers & Security 26(5), 391–400 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Braubach, L., Jander, K., Pokahr, A. (2013). A Practical Security Infrastructure for Distributed Agent Applications. In: Klusch, M., Thimm, M., Paprzycki, M. (eds) Multiagent System Technologies. MATES 2013. Lecture Notes in Computer Science(), vol 8076. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40776-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40776-5_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40775-8

  • Online ISBN: 978-3-642-40776-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics