th International Conference on Knowledge Based and Intelligent Information and Engineering Systems Agent ’ s security during communication in mobile agents system

Abstract Security is a very important concept in the growth and the development of the mobile agent technology. However, in most of researches, security properties are envisaged in the implementation phase. Nevertheless, the integration of security properties in all phases of software development can provide more secure mobile agents based systems. In this paper we are interested to model the security properties in order to protect stationary agents during their communications with visitor mobile agents.

[1]  Ljiljana Brankovic,et al.  An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.

[2]  Haralambos Mouratidis,et al.  Modelling secure multiagent systems , 2003, AAMAS '03.

[3]  Ghassan Beydoun,et al.  Towards Method Engineering for Multi-Agent Systems: A preliminary validation of a Generic MAS Metamodel , 2005, SEKE.

[4]  Ghassan Beydoun,et al.  Synthesis of a generic MAS metamodel , 2005, SELMAS.

[5]  M. Huget Nemo : an Agent-Oriented Software Engineering Methodology , 2022 .

[6]  Ghassan Beydoun,et al.  A security-aware metamodel for multi-agent systems (MAS) , 2009, Inf. Softw. Technol..

[7]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[8]  Magdy Saeb,et al.  Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree , 2003 .

[9]  Khaled Ghédira,et al.  MA-UML: a conceptual approach for mobile agents' modelling , 2009, Int. J. Agent Oriented Softw. Eng..

[10]  Liang Xiao,et al.  An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[11]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[12]  Elsabé Cloete,et al.  Classification of malicious host threats in mobile agent computing , 2002 .

[13]  Jeffrey J. P. Tsai,et al.  Formal Modeling and Analysis of a Secure Mobile-Agent System , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[14]  David A. Basin,et al.  SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.

[15]  Ghassan Beydoun,et al.  Modelling MAS-Specific Security Features , 2007, EMMSAD.

[16]  M. Loulou,et al.  A Conceptual Model for Secure Mobile Agent Systems , 2006, 2006 International Conference on Computational Intelligence and Security.

[17]  Jan Jürjens,et al.  UMLsec: Extending UML for Secure Systems Development , 2002, UML.

[18]  Agostino Poggi,et al.  Jade - a fipa-compliant agent framework , 1999 .

[19]  Niklas Borselius Mobile agent security , 2002 .

[20]  Leila Ismail,et al.  Apport des agents mobiles à l 'exécution répartie , 2002, Tech. Sci. Informatiques.