Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems

A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages of software development. However, there is no formal way provided for software developers to find out what makes a communication protocol secure and what are secure designs. In this paper we propose a method that defines security requirements, bridges security requirement analysis with security design, and integrates the security techniques into a communication protocol to fulfill the security requirements.

[1]  Abdelkader Hameurlain,et al.  Mobile agent cooperation methods for large scale distributed dynamic query optimization , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[2]  Abdelkader Hameurlain,et al.  Dynamic memory allocation strategies for parallel query execution , 2002, SAC '02.

[3]  Abdelkader Hameurlain,et al.  Mobile Agent Based Self-Adaptive Join for Wide-Area Distributed Query Processing , 2004, J. Database Manag..

[4]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[5]  E IoannidisYannis,et al.  Multi-dimensional resource scheduling for parallel queries , 1996 .

[6]  Philip S. Yu,et al.  On optimal processor allocation to support pipelined hash joins , 1993, SIGMOD Conference.

[7]  Y.-K. Kwok,et al.  Static scheduling algorithms for allocating directed task graphs to multiprocessors , 1999, CSUR.

[8]  Christine Collet,et al.  QBF: A Query Broker Framework for Adaptable Query Evaluation , 2004, FQAS.

[9]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[10]  Mohammad Ghodsi,et al.  Pipelined operator tree scheduling in heterogeneous environments , 2003, J. Parallel Distributed Comput..

[11]  Beng Chin Ooi,et al.  An adaptable distributed query processing architecture , 2005, Data Knowl. Eng..

[12]  Leon Sterling,et al.  Modelling a Smart Music Player with a Hybrid Agent-Oriented Methodology , 2007, 15th IEEE International Requirements Engineering Conference (RE 2007).

[13]  Surajit Chaudhuri,et al.  Towards a robust query optimizer: a principled and practical approach , 2005, SIGMOD '05.

[14]  Hongjun Lu,et al.  On Resource Scheduling of Multi-Join Queries in Parallel Database Systems , 1993, Inf. Process. Lett..

[15]  Hamid Pirahesh,et al.  Robust query processing through progressive optimization , 2004, SIGMOD '04.

[16]  Stavros Christodoulakis,et al.  On the propagation of errors in the size of join results , 1991, SIGMOD '91.

[17]  Rajeev Motwani,et al.  Scheduling problems in parallel query optimization , 1995, PODS '95.

[18]  KossmannDonald,et al.  Performance tradeoffs for client-server query processing , 1996 .

[19]  Alon Y. Halevy,et al.  An adaptive query execution system for data integration , 1999, SIGMOD '99.

[20]  Butler W. Lampson,et al.  31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .

[21]  KabraNavin,et al.  Efficient mid-query re-optimization of sub-optimal query execution plans , 1998 .

[22]  J DeWittDavid,et al.  A performance evaluation of four parallel join algorithms in a shared-nothing multiprocessor environment , 1989 .