Skip to main content
Log in

Abstract

With the rapid proliferation of software agents, there comes an increased need for agents to ensure that they do not provide data and/or services to unauthorized users. We first develop an abstract definition of what it means for an agent to preserve data/action security. Most often, this requires an agent to have knowledge that is impossible to acquire – hence, we then develop approximate security checks that take into account, the fact that an agent usually has incomplete/approximate beliefs about other agents. We develop two types of security checks – static ones that can be checked prior to deploying the agent, and dynamic ones that are executed at run time. We prove that a number of these problems are undecidable, but under certain conditions, they are decidable and (our definition of) security can be guaranteed. Finally, we propose a language within which the developer of an agent can specify her security needs, and present provably correct algorithms for static/dynamic security verification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Y. Arens, C.Y. Chee, C.-N. Hsu and C. Knoblock, Retrieving and integrating data from multiple information sources, International Journal of Intelligent Cooperative Information Systems 2(2) (1993) 127–158.

    Google Scholar 

  2. K. Arisha, F. Ozcan, R. Ross, V.S. Subrahmanian, T. Eiter and S. Kraus, IMPACT: a platform for collaborating agents, IEEE Intelligent Systems 14 (1999) 64–72.

    Google Scholar 

  3. F. Bergadano, A. Puliafito, S. Riccobene and G. Ruffo, Java-based and secure learning agents for information retrieval in distributed systems, Information Sciences 113(1–2) (1999) 55–84.

    Google Scholar 

  4. S. Berkovits, J. Guttman and V. Swarup, Authentication for mobile agents, in: Mobile Agents and Security, ed. G. Vigna, Lecture Notes in Computer Science, Vol. 1419 (Springer, New York, 1998) pp. 114–136.

    Google Scholar 

  5. E. Bertino, C. Bettini, E. Ferrari and P. Samarati, A temporal access control mechanism for database systems, IEEE Transactions on Knowledge and Data Engineering 8(1) (1996) 67–80.

    Google Scholar 

  6. E. Bertino, P. Samarati and S. Jajodia, Authorizations in relational database management systems, in: Proc. of the 1st ACM Conference on Computer and Communication Security, Fairfax, VA (November 1993).

  7. P. Bieber and F. Cuppens, A definition of secure dependencies using the logic of security, in: Proc. of the Computer Security Foundations Workshop IV (IEEE Computer Society Press, 1991).

  8. E.J. Bina, R.M. McCool, V.E. Jones and M. Winslett, Secure access to data over the Internet, in: Proc. of the Third International Conference on Parallel and Distributed Information Systems (PDIS 94), Austin, TX (IEEE-CS Press, 1994) pp. 99–102.

  9. P. Bonatti, S. Kraus, J. Salinas and V.S. Subrahmanian, Data security in heterogenous agent systems, in: Cooperative Information Agents, ed. M. Klusch (Springer, New York, 1998) pp. 290–305.

    Google Scholar 

  10. P. Bonatti, S. Kraus and V.S. Subrahmanian, Foundations of secure deductive databases, IEEE Transactions on Knowledge and Data Engineering 7(3) (1995) 406–422.

    Google Scholar 

  11. R. Campbell and T. Qian, Dynamic agent-based security architecture for mobile computers, in: The Second International Conference on Parallel and Distributed Computing and Networks (PDCN'98), Australia (December 1998).

  12. S. Castano, M.G. Fugini, G. Martella and P. Samarati, Database Security (Addison-Wesley, Reading, MA, 1995).

    Google Scholar 

  13. R.G.G. Cattell, ed., The Object Database Standard: ODMG-93 (Morgan Kaufmann, San Mateo, CA, 1994).

    Google Scholar 

  14. B.F. Chellas, Modal Logic (Cambridge University Press, 1980).

  15. D.M. Chess, Security in agents systems (1996). Available at http://www.av.ibm.com/InsideTheLab/Bookshelf/ScientificPapers/.

  16. D.M. Chess, Security issues in mobile code systems, in: Mobile Agents and Security, ed. G. Vigna, Lecture Notes in Computer Science, Vol. 1419 (Springer, New York, 1998) pp. 1–4.

    Google Scholar 

  17. M. Crosbie and E. Spafford, Applying genetic programming to intrusion detection, in: Proc. of the AAAI 1995 Fall, Symposium Series (November 1995).

  18. F. Cuppens, A modal logic framework to solve aggregation problems, in: Database Security, 5. Status and Prospects, eds. S. Jajodia and C. Landwehr (North-Holland, Amsterdam, 1992).

    Google Scholar 

  19. T. Eiter and V.S. Subrahmanian, Heterogeneous active agents, II. Algorithms and complexity, Artificial Intelligence 108(1–2) (1999) 257–307.

    Google Scholar 

  20. T. Eiter, V.S. Subrahmanian and G. Pick, Heterogeneous active agents, I. Semantics, Artificial Intelligence 108(1–2) (1999) 179–255.

    Google Scholar 

  21. O. Etzioni and D. Weld, A softbot-based interface to the Internet, Communications of the ACM 37(7) (1994) 72–76.

    Google Scholar 

  22. W.M. Farmer, J.D. Guttag and V. Swarup, Security for mobile agents: authentification and state appraisal, in: Proceedings of the Fourth ESORICS, eds. E. Bertino, H. Kurth, G. Martella and E. Montolivo, Rome, Italy, Lecture Notes in Computer Science, Vol. 1146 (Springer, New York, 1996) pp. 118–130.

    Google Scholar 

  23. L.N. Foner A security architecture for multi-agent matchmaking, in: Second International Conference on Multi-Agent Systems (ICMAS96), Japan (1996).

  24. S. Fritzinger and M. Mueller, Java security (1996). Available at http://java.sun.com/docs/white/index.html.

  25. R. Gray, D. Kotz, G. Cybenko and D. Rus, D'Agents: security in multiple-language, mobile-agent system, in: Mobile agents and security, ed. G. Vigna, Lecture Notes in Computer Science, Vol. 1419 (Springer, New York, 1998) pp. 154–187.

    Google Scholar 

  26. Q. He, K.P. Sycara and T.W. Finin, Personal security agent: KQML-based PKI, in: Proceedings of the 2nd International Conference on Autonomous Agents (AGENTS-98), New York, eds. K.P. Sycara and M. Wooldridge (ACM Press, 1998) pp. 377–384.

  27. N. Heintze and J.D. Tygar, A model for secure protocols and their compositions, IEEE Transactions on Software Engineering 22(1) (1996) 16–30.

    Google Scholar 

  28. F. Hohl, An approach to solve the problem of malicious hosts in mobile agent systems (1997). Available at http://inf.informatik.uni-stuttgart.de:80/ipvr/vs/mitarbeiter/hohlfz.engl.html.

  29. M. Hughes, Application and enterprise security with the JAVATM 2 platform (1998). Available at http://java.sun.com/events/jbe/98/features/security.html.

  30. M. Huhns and M. Singh (eds.), Readings in Agents (Morgan Kaufmann, San Mateo, CA, 1997).

    Google Scholar 

  31. S. Jajodia and R. Sandhu, Toward a multilevel relational data model, in: Proc. of ACM SIGMOD Conference on Management of Data, Denver, CO (May 1991).

  32. N.R. Jennings, Controlling cooperative problem solving in industrial multi-agent systems using joint intentions, Artificial Intelligence 75(2) (1995) 1–46.

    Google Scholar 

  33. R. Koblick, Concordia, Communications of the ACM 42(3) (1999) 96–97.

    Google Scholar 

  34. S. Kraus, Negotiation and cooperation in multi-agent environments, Artificial Intelligence, Special Issue on Economic Principles of Multi-Agent Systems 94(1–2) (1997) 79–98.

    Google Scholar 

  35. Y. Labrou and T. Finin, A semantics approach for KQML – a general purpose communications language for software agents, in: Proc. of the International Conference on Information and Knowledge Management (1994) pp. 447–455.

  36. Y. Labrou and T. Finin, Semantics for an agent communication language, in: International Workshop on Agent Theories, Architectures, and Languages, Providence, RI (1997) pp. 199–203.

  37. J.W. Lloyd, Foundations of Logic Programming (Springer, Berlin, 1984, 1987).

    Google Scholar 

  38. E. Lupu and M. Sloman, Towards a role-based framework for distributed systems management, Journal of Network and Systems Management 5(1) (1997) 5–30.

    Google Scholar 

  39. E.C. Lupu and M.S. Sloman, Reconciling role based management and role based access control, in: Second Role Based Access Control Workshop (RBAC'97) (George Mason University, Virginia, 1997) pp. 135–141.

    Google Scholar 

  40. P. Maes, Agents that reduce work and information overload, Communications of the ACM 37(7) (1994) 31–40.

    Google Scholar 

  41. J. Millen and T. Lunt, Security for object-oriented database systems, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA (May 1992).

  42. B. Moulin and B. Chaib-Draa, An overview of distributed artificial intelligence, in: Foundations of Distributed Artificial Intelligence, eds. G.M.P. O'Hare and N.R. Jennings (Wiley, New York, 1996) pp. 3–55.

    Google Scholar 

  43. G.C. Necula and P. Lee, Research on proof-carrying code on mobile-code security, in: Proceedings of the Workshop on Foundations of Mobile Code Security (1997). Available at http://www.cs.cmu.edu/~necula/pcc.html.

  44. T. Nishigaya, Design of multi-agent programming libraries for Java (1997). Available at http://www.fujitsu.co.jp/hypertext/free/kafka/paper.

  45. OMG, CORBAServices: common services specification, Technical Report 98-12-09, OMG (December 1998). Available at http://www.omg.org/.

  46. J.S. Rosenschein and G. Zlotkin, Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers (MIT Press, Boston, MA, 1994).

    Google Scholar 

  47. T. Sander and C. Tschudin, Protecting mobile agents against malicious hosts, in: Mobile agents and security, ed. G. Vigna, Lecture Notes in Computer Science, Vol. 1419 (Springer, New York, 1998) pp. 44–60.

    Google Scholar 

  48. H.J. Schumacher and S. Ghosh, A fundamental framework for network security, Journal of Network and Computer Applications 20(3) (1997) 305–322.

    Google Scholar 

  49. J. Siegal, CORBA Fundamentals and Programming (Wiley, New York, 1996).

    Google Scholar 

  50. S.O. Soueina, B.H. Far, T. Katsube and Z. Koono, MALL: a multi-agent learning language for competitive and uncertain environments, IEICE Transactions on Information and Systems 12 (1998) 1339–1349.

    Google Scholar 

  51. W. Stallings, Title Network and Internetwork Security: Principles and Practice (Prentice-Hall, Englewood Cliffs, NJ, 1995).

    Google Scholar 

  52. V.S. Subrahmanian, Amalgamating knowledge bases, ACM Transactions on Database Systems 19(2) (1994) 291–331.

    Google Scholar 

  53. V.S. Subrahmanian, P. Bonatti, J. Dix, T. Eiter, S. Kraus, F. Ozcan and R. Ross, Heterogeneous Agent Systems: Theory and Implementation (MIT Press, MA, 2000) (to appear).

    Google Scholar 

  54. H. Tai and K. Kosaka, The aglets project, Communications of the ACM 42(3) (1999) 100–101.

    Google Scholar 

  55. Z. Tari, Using agents for secure access to data in the Internet, IEEE Communications Magazine 35(6) (1997) 136–140.

    Google Scholar 

  56. A. Tarski, Logic, Semantics, Metamathematics (Hackett Publishing Company, 1981).

  57. C. Thirunavukkarasu, T. Finin and J. Mayfield, Secret agents – a security architecture for the KQML agent communication language, in: Intelligent Information Agents Workshop, Fourth International Conference on Information and Knowledge Management CIKM'95, Baltimore, MD (November 1995).

  58. G. Vigna, Cryptographic traces for mobile agents, in: Mobile Agents and Security, ed. G. Vigna, Lecture Notes in Computer Science, Vol. 1419 (Springer, New York, 1998) pp. 137–153.

    Google Scholar 

  59. G. Vigna (ed.), Mobile Agents and Security, Lecture Notes in Computer Science, Vol. 1419 (Springer, New York, 1998).

    Google Scholar 

  60. M. Wellman, A market-oriented programming environment and its application to distributed multicommodity flow problems, Journal of Artificial Intelligence Research 1 (1993) 1–23.

    Google Scholar 

  61. G. Wiederhold, Intelligent integration of information, in: Proceedings of ACM SIGMOD Conference on Management of Data (Washington, DC, 1993) pp. 434–437.

  62. M. Winslett, K. Smith and X. Qian, Formal query languages for secure relational databases, ACM Transactions on Database Systems 19(4) (1994) 626–662.

    Google Scholar 

  63. M. Wooldridge and N.R. Jennings, Intelligent agents: theory and practice, Knowledge Engineering Reviews 10(2) (1995).

  64. N. Yialelis, E. Lupu and M. Sloman, Role-based security for distributed object systems, in: IEEE WET-ICE, Stanford (1996).

  65. M. Zapf, H. Mueller and K. Geihs, Security requirements for mobile agents in electronic markets, in: Lecture Notes in Computer Science, Vol. 1402 (Springer, New York, 1998) pp. 205–217.

    Google Scholar 

  66. L. Zeng and H. Wang, Towards a multi-agent security system: a conceptual model for Internet security, in: Proceedings of Fourth AIS (Association for Information Systems) Conference, Baltimore, MD (August 1998).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bonatti, P.A., Kraus, S. & Subrahmanian, V. Secure Agents. Annals of Mathematics and Artificial Intelligence 37, 169–235 (2003). https://doi.org/10.1023/A:1020233522878

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1020233522878

Keywords

Navigation