全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Multiagent Systems Protection

DOI: 10.1155/2011/281517

Full-Text   Cite this paper   Add to My Lib

Abstract:

Agent-systems can bring important benefits especially in applications scenarios where highly distributed, autonomous, intelligence, self-organizing, and robust systems are required. Furthermore, the high levels of autonomy and self-organizations of agent systems provide excellent support for developments of systems in which dependability is essential. Both Ubiquitous Computing and Ambient Intelligence scenarios belong in this category. Unfortunately, the lack of appropriate security mechanisms, both their enforcement and usability, is hindering the application of this paradigm in real-world applications. Security issues play an important role in the development of multiagent systems and are considered to be one of the main issues to solve before agent technology is ready to be widely used outside the research community. In this paper, we present a software based solution for the protection of multiagent systems concentrating on the cooperative agents model and the protected computing approach. 1. Introduction In the area of information systems, security is one of the most interesting topics. Recently, with the huge growth in the number of distributed systems, the number of computing attacks has increased and therefore so has the number of protection systems. The first work done on software agents was in the mid 1970s by Hewitt and Baker [1]. Hewitt created an agent model (named Actor), which he defined as an autonomous object that interacts and executes concurrently with an internal state and communication capability. Since that initial conception, and due to the work developed in Distributed Artificial Intelligence (DAI), a new concept has arisen known as the Multi-Agent System. The main appeal of these systems is that they allow two or more entities to join forces to perform a common task, which is very difficult to complete individually. Nowadays a huge variation of software agents exists according to their features, abilities, or properties. Mobile agents are implementations of remote programs, that is, those programs developed in a computer and distributed in other computers to continue their execution [2]. The migration capability provokes different security risks and makes controlling the following aspects essential: the protection of hosts against agents and the protection of agents against the host and authors to define the network protection. The firsts MAS applications appeared in the middle of the 80s. These first systems covered a wide variety of environments (manufacturing systems, process control, air traffic control, information

References

[1]  C. Hewitt and H. Baker, “Actors and continuous functionals,” 1977.
[2]  H. S. Nwana, “Software agents: an overview,” The Knowledge Engineering Review, vol. 11, no. 3, pp. 205–244, 1996.
[3]  N. R. Jennings and K. Sycara, “A roadmap of agent research and development,” 1998.
[4]  B. Chaib-draa, “Industrial applications of distributed AI,” Communications of the ACM, vol. 38, no. 11, p. 4, 1995.
[5]  H. Wang and C. Wang, “Intelligent agents in the nuclear industry,” Computer, vol. 30, no. 11, pp. 28–34, 1997.
[6]  U. M. Schwuttke and A. G. Quan, “Enhancing performance of cooperating agents in real-time diagnostic systems,” in Proceedings of the 13th international Joint Conference on Artifical intelligence (IJCAI '93), pp. 332–337, Chambery, France, 1993.
[7]  A. Ma?a, A. Mu?oz, and D. Serrano, “Towards secure agent computing for ubiquitous computing and ambient intelligence,” in Ubiquitous Intelligence and Computing, vol. 4611 of Lecture Notes in Computer Science, pp. 1201–1212, Springer, New York, NY, USA, 2007.
[8]  G. C. Necula, “Proof-carrying code,” in Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '97), pp. 106–119, ACM, New York, NY, USA, 1997.
[9]  B. S. Yee, “Secure Internet programming,” in A Sanctuary for Mobile Agents, pp. 261–273, Springer, London, UK, 1999.
[10]  J. P. Stern, G. Hachez, F. Koeune, and J.-J. Quisquater, “Robust object watermarking: application to code,” in Proceedings of the 3rd International Workshop on Information Hiding (IH '99), pp. 368–378, Springer, 2000.
[11]  G. Hachez, A comparative study of software protection tools suited for E-commerce with contributions to software watermarking and smart cards, Ph.D. thesis, Universite Catholique de Louvain, March 2003.
[12]  C. S. Collberg and C. Thomborson, “Watermarking, tamper-proofing, and obfuscation—tools for software protection,” IEEE Transactions on Software Engineering, vol. 28, no. 8, pp. 735–746, 2002.
[13]  S. Katzenbeisser and F. A. Petitcolas, Eds., Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, Mass, USA, 1st edition, 2000.
[14]  O. Goldreich, “Towards a theory of software protection and simulation by oblivious rams,” in Proceedings of the 9th Annual ACM Symposium on Theory of Computing (STOC '87), pp. 182–194, ACM, 1987.
[15]  T. Sander and C. F. Tschudin, “On software protection via function hiding,” in Information Hiding, D. Aucsmith, Ed., vol. 1525 of Lecture Notes in Computer Science, pp. 111–123, Springer, 1998.
[16]  S. Pearson, Trusted Computing Platforms: TCPA Technology in Context, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2002.
[17]  A. Ma?a and A. Mu?oz, “Mutual protection for multiagent systems,” in Proceedings of the 3rd International Workshop on Safety and Security in Multiagent Systems, p. 37, Citeseer, Hakodate, Japan, 2007.
[18]  A. Ma?a, J. Lopez, J. J. Ortega, E. Pimentel, and J. M. Troya, “A framework for secure execution of software,” International Journal of Information Security, vol. 3, no. 2, pp. 99–112, 2004.
[19]  Apache Software Foundation, BCEL (Byte Code Engineering Library), 2006.
[20]  S. Chiba, Javassist (Java Programming Assistant), Sun Microsystems, 2009.
[21]  OW2 Consortium. ASM.
[22]  T. Lindholm and F. Yellin, The JavaTM Virtual Machine Specification, Sun Microsystem, 1999.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413