A Set of Patterns for Secure Agent Systems

Security patterns capture the experiences of experts, allowing novices to rely on expert knowledge and solve security problems in a more systematic and structured way. So far, literature provides many examples of security patterns for object-oriented systems, but no attempt has been made to document security patterns for multiagent systems. In this paper we present a set of patterns for secure agent systems that, currently, consists of four patterns.

[1]  William Stallings,et al.  Cryptography and network security , 1998 .

[2]  Edward G. Amoroso,et al.  Fundamentals of computer security technology , 1994 .

[3]  Jamie Jaworski,et al.  Java Security Handbook , 2000 .

[4]  Haralambos Mouratidis,et al.  Modelling an agent-based integrated health and social care information system for older people , 2002 .

[5]  James O. Coplien,et al.  Pattern languages of program design , 1995 .

[6]  Haralambos Mouratidis,et al.  Analysis and Design of the eSAP: An Integrated Health and Social Care Information System , 2003, Health Informatics J..

[7]  Ehud Gudes,et al.  A Method-Based Authorization Model for Object-Oriented Databases , 1993, Security for Object-Oriented Systems.

[8]  Joseph W. Yoder,et al.  Architectural Patterns for Enabling Application Security , 1998 .

[9]  Haralambos Mouratidis,et al.  Using Tropos Methodology to Model an Integrated Health Assessment System , 2002, AOIS@CAiSE.

[10]  Sami Lehtonen,et al.  Pattern Language for Cryptographic Key Management , 2002, EuroPLoP.

[11]  Gil Tidhar,et al.  Using Intelligent Agents in Military Simulation or "Using Agents Intelligently" , 1999, AAAI/IAAI.

[12]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[13]  Haralambos Mouratidis,et al.  Modelling secure multiagent systems , 2003, AAMAS '03.

[14]  Danny B. Lange,et al.  Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .

[15]  Nicholas R. Jennings,et al.  Decision procedures for multiple auctions , 2002, AAMAS '02.

[16]  Jennifer Seberry,et al.  Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.

[17]  Premkumar T. Devanbu,et al.  Software engineering for security: a roadmap , 2000, ICSE '00.

[18]  Eduardo B. Fernandez,et al.  The Authenticator Pattern , 1999 .

[19]  Peter Sommerlad,et al.  Pattern-Oriented Software Architecture Volume 1: A System of Patterns , 1996 .

[20]  John Mylopoulos,et al.  A Goal-Based Organizational Perspective on Multi-agent Architectures , 2001, ATAL.

[21]  A Min Tjoa,et al.  Access Controls by Object-Oriented Concepts , 1997, DBSec.

[22]  Eduardo B. Fernandez,et al.  A pattern language for security models , 2001 .