Abstract
Mobile agents’ security is a major challenge for the expansion of their use. Actually, most research works have been interested in integrating mobile agents’ security requirements in the implementation stage. However, the integration of security requirements in the design stage could help towards the development of more secure systems based on mobile agents. In this paper, we are interested to model the security requirements of mobile agents in the design stage in order to protect places from malicious visitor agents. An example from a teleexpertise system is used to illustrate the proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Weyns, D., Parunak, H.V.D., Michel, F., Holvoet, T., Ferber, J.: Environments for multiagent systems, state-of-the-art and research challenges. In: Proceedings of the first International Conference on Environments for Multi-Agent Systems, New York (2004)
Pham, V.A., Karmouch, A.: Mobile software agents: an overview. IEEE Commun. Mag. 36(7), 26–37 (1998)
Mouratidis, H.: Modelling secure multiagent systems, pp. 859–866. University of Sheffield, New York, USA (2003)
Hachicha, H., Loukil, A., Ghedira, K.: MA-UML: a conceptual approach for mobile agents modelling. Int. J. Agent-Oriented Softw. Eng. (IJAOSE 2009) 3(2/3), 277–305 (2009)
Alfalayleh, M., Brankovic, L.: An overview of security issues and techniques in mobile agents. In: Conference on Communications and Multimedia Security. University of Newcastle, Australia (2004)
Jansen, W.A.: Countermeasures for mobile agent security. In: Computer Communications Special Issue on Advances in Research and Application of Network Security, pp. 1667–1676. Elsevier (2000)
Loulou, M., Hadj-Kacem, A., Jmaiel, M., Mosbah, M.: A conceptual model for secure mobile agent systems. IEEE (CIS 06), Guangzhou, China, pp. 524–527, 2006. In: Proceedings of the IEEE International Conference on Computational Intelligence and Security (CIS 06), Guangzhou, China, pp. 524–527 (2006)
Ma, L., Tsai, J.P.: Formal modelling and analysis of a secure mobile-agent system. Piscataway, NJ, USA, pp. 180–196, 2008. IEEE Transactions on Systems, Man and Cybernetics, Piscataway, NJ, USA (2008)
Pankaj, M., Divya, B., Nripesh, K.: An efficient approach for mobile agent security (0975 – 8887). Int. J. Comput. Appl. 107(6), 21–25 (2014)
Jurjens, J.: UMLsec: extending UML for secure systems developmen. In: UML 2002 - The Unified Modeling Language. Proceedings of 5th International Conference Model Engineering, Languages, Concepts, and Tools, Dresden, Germany, September/October (2002)
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modelling language for model-driven security. In: The Proceedings of the 5th International Conference on the Unified Modeling Language (2002)
Xiao, L., Peet, A., Lewis, P., Dasmahapatra, S., Saez, C., Croitoru, M., Vicente, J., Gonzalez-Valez, H., Liuch i Ariet, M.: An adaptive security model for multi-agent systems and application to a clinical trials environment. In: Proceedings of the 31st IEEE Annual International Computer Software and Applications Conference (COMPSAC 2007) Volume II, IEEE Computer Society, pp. 261–268 (2007)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE J. Mag. 29(2), 38–47 (1996)
Beydoun, G., Gonzales-Perez, C., Low, G.C., Henderson-Sellers, B.: Towards method engineering for MAS: A preleminary validation of a generic MAS Metamodel. In: 17th Software Engineering and Knowledge Engineering Conference (2005b)
Loukil, A., Hachicha, H., Ghédira, K.: Using mobile agent technology for distributed health-care teleexpertise systems. In: The IFMBE Proceedings of the 3rd European Medical and Biological conference (EMBEC 2005), Prague, Czech Republic; November 20–25, vol. 11 (2005)
Lange, D.B., Mitsuru, O.: Programming and Deploying Java Mobile Agents Aglets. Addison-Wesley, Boston, MA, USA (1998)
Robert, S., Gray, L., David, K., George, C., Daniela, R.: D’Agents: Security in a multiple-language, mobile-agent system. In: A chapter in the book Mobile Agents and Security, pp. 154–187, edited by Giovanni Vigna
Rekik, M., Kallel, S., Loulou, M., Kacem, A.H.: Modeling secure mobile agent systems. In: Jezic, G., Kusek, M., Nguyen, N.-T., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2012. LNCS, vol. 7327, pp. 330–339. Springer, Heidelberg (2012)
Loulou, M., Jmaiel, M., Mosbah, M.: Dynamic Security framework for mobile agent systems: specification, verification and enforcement. IJICS 3, 321–336 (2009)
Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E: SAS: a secure aglet server. In: Proceedings of Computer Security Conference (2007)
Todd McDonald, J., Yasinsac, A.: Security Models for Mobile Agent System. www.elsevier.com/locate/entcs
Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET- secure agent communication model. In: Proceedings of 11th ICCIT 2008, pp. 371–375. IEEE (2008)
Mouratidis, H., Giorgini, P.: Secure Tropos: a security-oriented extension of the Tropos methodology”. Int. J. Softw. Eng. 17, 285 (2007). doi:10.1142/S0218194007003240
Huget, M.P.: Nemo: An agent-oriented software engineering methodology. In: OOPSLA Workshop on Agent Oriented Methodologies Seattle (2002)
Belloni, E., Marcos, C.: Modeling of mobile-agent applications with UML. In: Proceedings of the Fourth Argentine Symposium on Software Engineering (ASSE 2003), 32 JAIIO (Jornadas Argentinas de Informática e Investigación Operativa), Buenos Aires, Argentina, September, ISSN: 1666–1141, vol. 32 (2003)
Kusek, M., Jezic, G.: Extending UML sequence diagrams to model agent mobility. In: Padgham, L., Zambonelli, F. (eds.) AOSE VII / AOSE 2006. LNCS, vol. 4405, pp. 51–63. Springer, Heidelberg (2007)
Kang, M., Taguchi, K.: Modeling mobile agent applications by extended UML activity diagram. In: Proceedings of the 6th International Conference on Enterprise Information Systems (ICEIS 2004), Porto, Portugal, April, pp. 519–522 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Hachicha, H., Samet, D., Ghedira, K. (2015). A Conceptual Approach to Place Security in Systems of Mobile Agents. In: Müller, J., Ketter, W., Kaminka, G., Wagner, G., Bulling, N. (eds) Multiagent System Technologies . MATES 2015. Lecture Notes in Computer Science(), vol 9433. Springer, Cham. https://doi.org/10.1007/978-3-319-27343-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-27343-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27342-6
Online ISBN: 978-3-319-27343-3
eBook Packages: Computer ScienceComputer Science (R0)