Security in Multi-Agent Systems

The agent paradigm appears promising and much research has been devoted to it during the last decade. In this paper we consider security issues that need to be addressed before multi-agent systems can be a viable solution for a broad range of commercial applications. We do this through considering the implications of the characteristics given to agents and general properties of open multi-agent systems. We then look at some past and present work that addresses security issues of multi-agent systems. Finally, we consider how existing security technology can be used to address the security issues, and where the gaps are most likely

[1]  M. R. Genesereth,et al.  Knowledge Interchange Format Version 3.0 Reference Manual , 1992, LICS 1992.

[2]  Levente Buttyán,et al.  On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.

[3]  Vesna Hassler,et al.  Security Fundamentals for E-Commerce , 2000 .

[4]  Bernard Burg,et al.  Towards the deployment of an open Agent World , 2000, JFIADSMA.

[5]  Tim Finin,et al.  Secret Agents - A Security Architecture for the KQML Agent Communication Language , 1995, CIKM 1995.

[6]  Lars Rasmusson,et al.  Simulated social control for secure Internet commerce , 1996, NSPW '96.

[7]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[8]  J. Galliers A theoretical framework for computer models of cooperative dialogue, acknowledging multiagent conflict , 1988 .

[9]  Jeffrey M. Bradshaw,et al.  An introduction to software agents , 1997 .

[10]  H. Penny Nii,et al.  The Handbook of Artificial Intelligence , 1982 .

[11]  Mike Williamson,et al.  Matchmaking and Brokering , 1996 .

[12]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[13]  Chris J. Mitchell,et al.  On Mobile Agent Based Transactions in Moderately Hostile Environments , 2001, Network Security.

[14]  Fred B. Schneider,et al.  Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.

[15]  Giovanni Vigna,et al.  Protecting Mobile Agents through Tracing , 1997 .

[16]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[17]  Gio Wiederhold,et al.  Mediators in the architecture of future information systems , 1992, Computer.

[18]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[19]  Fritz Hohl A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.

[20]  Nicholas R. Jennings,et al.  A Roadmap of Agent Research and Development , 2004, Autonomous Agents and Multi-Agent Systems.

[21]  Jeffrey S. Rosenschein,et al.  Deals Among Rational Agents , 1985, IJCAI.

[22]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[23]  William M. Farmer,et al.  Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.

[24]  X Itu,et al.  Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .

[25]  Qi He,et al.  Personal security agent: KQML-based PKI , 1998, AGENTS '98.

[26]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[27]  Stefan Poslad,et al.  Towards improved trust and security in FIPA agent platforms , 2004 .