Communication Security on MASs - A Literature Review

Article Preview

Abstract:

With widely applications of Multi-Agent System in internet and intranet, how to ensure security related to multi-agent is a big issue. This paper mainly focuses on communication security of MASs. Through investigation, there are five typical security models relating to MASs, and all these models communicate using XML data format. With traditional cryptographic technology, these models provide a coarse granularity security. The paper proposes XML Security Specifications which based on XML should be deployed within MASs communication.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1849-1852

Citation:

Online since:

January 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Omicini, A. Ricci, M. Viroli. Agent Coordination Contexts for the formal specification and enactment of coordination and security policies. Science of Computer Programming 63 (2006), p.88–107.

DOI: 10.1016/j.scico.2005.07.014

Google Scholar

[2] L. Lhotska and L. Prieto. A Multi-agent System for Information Retrieval. Springer-Verlag. LNCS 4739 (2007), p.337 – 344.

Google Scholar

[3] S. Karnouskos. Security implications of implementing active network infrastructures using agent technology. Computer Networks, Volume 36, Issue 1(2001), pp.87-100.

DOI: 10.1016/s1389-1286(01)00155-4

Google Scholar

[4] T.D.   Peddireddy, J.M. Vidal, Multiagent network security system using FIPA-OS. SoutheastCon (2002), pp.229-233.

DOI: 10.1109/secon.2002.995592

Google Scholar

[5] E. Oliveira, Z. Abdelouahab, D. Lopes, Security on MASs with XML Security Specifications. Database and expert systems applications (2006), pp.5-9.

DOI: 10.1109/dexa.2006.126

Google Scholar

[6] N. Borselius, C. J. Mitchell, Securing FIPA Agent Communication. Security and Management (2003), pp.135-141.

Google Scholar

[7] P. Novák, M. Rollo, J. Hodík, T. Vlček. Communication Security in Multi-agent Systems. CEEMAS 2003, LNAI 2691(2003), pp.454-463.

DOI: 10.1007/3-540-45023-8_44

Google Scholar

[8] E. Shakshuki, Z. Luo, J. Gong. An agent-based approach to security service. Journal of Network and Computer Applications. Volume 28, Issue 3 (2005), pp.183-208.

DOI: 10.1016/j.jnca.2004.06.004

Google Scholar

[9] S. Raghunathan, A. R. Mikler, C. Cozzolino. Secure agent computation: X. 509 Proxy Certificates in a multi-lingual agent framework. The Journal of Systems and Software 75 (2005), pp.125-137.

DOI: 10.1016/j.jss.2004.01.008

Google Scholar

[10] X. Vila, A. Schuster, A. Riera. Security for a Multi-Agent System based on JADE. Computer & Security 26 (2007), pp.391-400.

DOI: 10.1016/j.cose.2006.12.003

Google Scholar

[11] R. Ghanea-Hercock, I. Gifford. Top-Secret Multi-Agent Systems. Electronic Notes in Theoretical Computer Science, Volume 63(2002), pp.77-90.

DOI: 10.1016/s1571-0661(04)80338-4

Google Scholar