Skip to main content

A Conceptual Approach to Place Security in Systems of Mobile Agents

  • Conference paper
  • First Online:
Multiagent System Technologies (MATES 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9433))

Included in the following conference series:

Abstract

Mobile agents’ security is a major challenge for the expansion of their use. Actually, most research works have been interested in integrating mobile agents’ security requirements in the implementation stage. However, the integration of security requirements in the design stage could help towards the development of more secure systems based on mobile agents. In this paper, we are interested to model the security requirements of mobile agents in the design stage in order to protect places from malicious visitor agents. An example from a teleexpertise system is used to illustrate the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Weyns, D., Parunak, H.V.D., Michel, F., Holvoet, T., Ferber, J.: Environments for multiagent systems, state-of-the-art and research challenges. In: Proceedings of the first International Conference on Environments for Multi-Agent Systems, New York (2004)

    Google Scholar 

  2. Pham, V.A., Karmouch, A.: Mobile software agents: an overview. IEEE Commun. Mag. 36(7), 26–37 (1998)

    Article  Google Scholar 

  3. Mouratidis, H.: Modelling secure multiagent systems, pp. 859–866. University of Sheffield, New York, USA (2003)

    Google Scholar 

  4. Hachicha, H., Loukil, A., Ghedira, K.: MA-UML: a conceptual approach for mobile agents modelling. Int. J. Agent-Oriented Softw. Eng. (IJAOSE 2009) 3(2/3), 277–305 (2009)

    Article  Google Scholar 

  5. Alfalayleh, M., Brankovic, L.: An overview of security issues and techniques in mobile agents. In: Conference on Communications and Multimedia Security. University of Newcastle, Australia (2004)

    Google Scholar 

  6. Jansen, W.A.: Countermeasures for mobile agent security. In: Computer Communications Special Issue on Advances in Research and Application of Network Security, pp. 1667–1676. Elsevier (2000)

    Google Scholar 

  7. Loulou, M., Hadj-Kacem, A., Jmaiel, M., Mosbah, M.: A conceptual model for secure mobile agent systems. IEEE (CIS 06), Guangzhou, China, pp. 524–527, 2006. In: Proceedings of the IEEE International Conference on Computational Intelligence and Security (CIS 06), Guangzhou, China, pp. 524–527 (2006)

    Google Scholar 

  8. Ma, L., Tsai, J.P.: Formal modelling and analysis of a secure mobile-agent system. Piscataway, NJ, USA, pp. 180–196, 2008. IEEE Transactions on Systems, Man and Cybernetics, Piscataway, NJ, USA (2008)

    Google Scholar 

  9. Pankaj, M., Divya, B., Nripesh, K.: An efficient approach for mobile agent security (0975 – 8887). Int. J. Comput. Appl. 107(6), 21–25 (2014)

    Google Scholar 

  10. Jurjens, J.: UMLsec: extending UML for secure systems developmen. In: UML 2002 - The Unified Modeling Language. Proceedings of 5th International Conference Model Engineering, Languages, Concepts, and Tools, Dresden, Germany, September/October (2002)

    Google Scholar 

  11. Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modelling language for model-driven security. In: The Proceedings of the 5th International Conference on the Unified Modeling Language (2002)

    Google Scholar 

  12. Xiao, L., Peet, A., Lewis, P., Dasmahapatra, S., Saez, C., Croitoru, M., Vicente, J., Gonzalez-Valez, H., Liuch i Ariet, M.: An adaptive security model for multi-agent systems and application to a clinical trials environment. In: Proceedings of the 31st IEEE Annual International Computer Software and Applications Conference (COMPSAC 2007) Volume II, IEEE Computer Society, pp. 261–268 (2007)

    Google Scholar 

  13. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE J. Mag. 29(2), 38–47 (1996)

    Article  Google Scholar 

  14. Beydoun, G., Gonzales-Perez, C., Low, G.C., Henderson-Sellers, B.: Towards method engineering for MAS: A preleminary validation of a generic MAS Metamodel. In: 17th Software Engineering and Knowledge Engineering Conference (2005b)

    Google Scholar 

  15. Loukil, A., Hachicha, H., Ghédira, K.: Using mobile agent technology for distributed health-care teleexpertise systems. In: The IFMBE Proceedings of the 3rd European Medical and Biological conference (EMBEC 2005), Prague, Czech Republic; November 20–25, vol. 11 (2005)

    Google Scholar 

  16. Lange, D.B., Mitsuru, O.: Programming and Deploying Java Mobile Agents Aglets. Addison-Wesley, Boston, MA, USA (1998)

    Google Scholar 

  17. Robert, S., Gray, L., David, K., George, C., Daniela, R.: D’Agents: Security in a multiple-language, mobile-agent system. In: A chapter in the book Mobile Agents and Security, pp. 154–187, edited by Giovanni Vigna

    Google Scholar 

  18. Rekik, M., Kallel, S., Loulou, M., Kacem, A.H.: Modeling secure mobile agent systems. In: Jezic, G., Kusek, M., Nguyen, N.-T., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2012. LNCS, vol. 7327, pp. 330–339. Springer, Heidelberg (2012)

    Google Scholar 

  19. Loulou, M., Jmaiel, M., Mosbah, M.: Dynamic Security framework for mobile agent systems: specification, verification and enforcement. IJICS 3, 321–336 (2009)

    Article  Google Scholar 

  20. Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E: SAS: a secure aglet server. In: Proceedings of Computer Security Conference (2007)

    Google Scholar 

  21. Todd McDonald, J., Yasinsac, A.: Security Models for Mobile Agent System. www.elsevier.com/locate/entcs

  22. Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET- secure agent communication model. In: Proceedings of 11th ICCIT 2008, pp. 371–375. IEEE (2008)

    Google Scholar 

  23. Mouratidis, H., Giorgini, P.: Secure Tropos: a security-oriented extension of the Tropos methodology”. Int. J. Softw. Eng. 17, 285 (2007). doi:10.1142/S0218194007003240

    Google Scholar 

  24. Huget, M.P.: Nemo: An agent-oriented software engineering methodology. In: OOPSLA Workshop on Agent Oriented Methodologies Seattle (2002)

    Google Scholar 

  25. Belloni, E., Marcos, C.: Modeling of mobile-agent applications with UML. In: Proceedings of the Fourth Argentine Symposium on Software Engineering (ASSE 2003), 32 JAIIO (Jornadas Argentinas de Informática e Investigación Operativa), Buenos Aires, Argentina, September, ISSN: 1666–1141, vol. 32 (2003)

    Google Scholar 

  26. Kusek, M., Jezic, G.: Extending UML sequence diagrams to model agent mobility. In: Padgham, L., Zambonelli, F. (eds.) AOSE VII / AOSE 2006. LNCS, vol. 4405, pp. 51–63. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  27. Kang, M., Taguchi, K.: Modeling mobile agent applications by extended UML activity diagram. In: Proceedings of the 6th International Conference on Enterprise Information Systems (ICEIS 2004), Porto, Portugal, April, pp. 519–522 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Héla Hachicha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Hachicha, H., Samet, D., Ghedira, K. (2015). A Conceptual Approach to Place Security in Systems of Mobile Agents. In: Müller, J., Ketter, W., Kaminka, G., Wagner, G., Bulling, N. (eds) Multiagent System Technologies . MATES 2015. Lecture Notes in Computer Science(), vol 9433. Springer, Cham. https://doi.org/10.1007/978-3-319-27343-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27343-3_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27342-6

  • Online ISBN: 978-3-319-27343-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics