Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 55))

Abstract

After a first phase of great activity in the field of multi-agent systems, researchers seemed to loose interest in the paradigm, mainly due to the lack of scenarios where the highly distributed nature of these systems could be appropriate. However, recent computing models such as ubiquitous computing and ambient intelligence have introduced the need for this type of highly distributed, autonomous and asynchronous computing mechanisms. The agent paradigm can play an important role and can suit the needs of many applications in these scenarios. In this paper we argue that the main obstacle for the practical application of multi-agent systems is the lack of appropriate security mechanisms. Moreover, we show that as a result of recent advances in security technologies, it is now possible to solve the most important security problems of agent-based systems.

Work partially supported by E.U. through projects SERENITY (IST-027587) and OKKAM (IST- 215032) and DESEOS project funded by the Regional Government of andalusia.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lopez, J., Maña, A., Muñoz, A.: A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 977–987. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Maña, A., Muñoz, A.: Mutual Protection for Multiagent Systems. In: Proceedings of the Third International 3rd International Workshop on Safety and Security in Multiagent Systems (SASEMAS 2006) in Autonomous Agents and Multi-agents Systems (AAMAS 2006) (2006)

    Google Scholar 

  3. Jennings, N., Sycara, K., Wooldridge, M.: A Roadmap for Agent Research and Development. Autonomous Agents and Multiagent Systems 1(1) (1998) (forthcoming)

    Google Scholar 

  4. Chaib-draa, B.: Industrial Applications of Distributed AI. Communications of the ACM 38(11), 49–53 (1995)

    Article  Google Scholar 

  5. Jennings, N.R., Corera, J.M., Laresgoiti, I.: Developing Industrial Multiagent Systems. In: Proceedings of the First International Conference on Multiagent Systems, pp. 423–430. AAAI Press, Menlo Park (1995)

    Google Scholar 

  6. Wang, H., Wang, C.: Intelligent Agents in the Nuclear Industry. IEEE Computer 30(11), 28–34 (1997)

    Google Scholar 

  7. Schwuttke, U.M., Quan, A.G.: Enhancing Performance of Cooperating Agents in Real-Time Diagnostic Systems. In: Proceedings of the Thirteenth International Joint Conference on Artificial Intelligence (IJCAI 1993), pp. 332–337. International Joint Conferences on Artificial Intelligence, Menlo Park (1993)

    Google Scholar 

  8. Clements, P., Papaioannou, T., Edwards, J.: Aglets: Enabling the Virtual Enterprise. In: The Proc. of Managing Enterprises - Stakeholders, Engineering, Logistics and Achievement (ME-SELA 1997), p. 425 (1997) ISBN 1 86058 066 1

    Google Scholar 

  9. http://cougaar.org/

  10. Shepherdson, D.: The JACK Usage Report. In: The Proc of. Autonomous Agents and Multi Agents Systems (AAMAS 2003) (2003)

    Google Scholar 

  11. http://jade.tilab.com/

  12. http://www.irit.fr/recherches/ISPR/IAM/JavAct.html

  13. Alechina, N., Alechina, R., Hübner, J., Jago, M., Logan, B.: Belief revision for AgentSpeak agents. In: The Proc. of Autonomous Agents and Multi Agents Systems, Hakodate, Japan, pp. 1288–1290 (2006) ISBN:1-59593-303-4

    Google Scholar 

  14. Maña, A., López, J., Ortega, J., Pimentel, E., Troya, J.M.: A Framework for Secure Execution of Software. International Journal of Information Security 3(2) (2004)

    Google Scholar 

  15. Trusted Computing Group: TCG Specifications. Workshop on Safety and Security in Multiagent Systems (SASEMAS 2006) (2005), https://www.trustedcomputinggroup.org/specs/

  16. Necula, G.: Proof-Carrying Code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maña, A., Muñoz, A., Serrano, D. (2009). Protected Computing Approach: Towards the Mutual Protection of Agent Computing. In: Demazeau, Y., Pavón, J., Corchado, J.M., Bajo, J. (eds) 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009). Advances in Intelligent and Soft Computing, vol 55. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00487-2_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00487-2_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00486-5

  • Online ISBN: 978-3-642-00487-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics