Skip to main content

Modeling Secure Mobile Agent Systems

  • Conference paper
Agent and Multi-Agent Systems. Technologies and Applications (KES-AMSTA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7327))

Abstract

We propose a MDA based approach for designing secure mobile agent systems. First, we define a meta-model which extends the UML deployment diagram by concepts related to the security and mobility of multi-agent systems. We propose also a UML profile as an implementation of this meta-model. Second, we project the application model into AGLETS-specific model, which describes the main functionalities of the application deployed on AGLETS as a mobile agent platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jarraya, T., Guessoum, Z.: Towards a Model Driven Process for Multi-Agent System. In: Burkhard, H.-D., Lindemann, G., Verbrugge, R., Varga, L.Z. (eds.) CEEMAS 2007. LNCS (LNAI), vol. 4696, pp. 256–265. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  2. Fink, T., Koch, M., Pauls, K.: An MDA approach to Access Control Specifications Using MOF and UML Profiles. In: Proc. of the 1st VODCA, pp. 161–179 (2004)

    Google Scholar 

  3. Bryce, C.B.: A Security Framework for a Mobile Agent System. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 273–290. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Loulou, M., Jmaiel, M., Mosbah, M.: Dynamic Security Framework for Mobile Agent Systems: specification, verification and enforcement. IJICS, 321–336 (2009)

    Google Scholar 

  5. Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models to Access Control Infrastructures. ACM TOSEM 15, 39–91 (2006)

    Article  Google Scholar 

  6. IBM: Aglets (1996), http://www.trl.ibm.com/aglets/

  7. Jouault, F., Kurtev, I.: Transforming Models with ATL. In: Bruel, J.-M. (ed.) MoDELS 2005. LNCS, vol. 3844, pp. 128–138. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET- Secure Agent Communication Model. In: Proc. of 11th ICCIT 2008, pp. 371–375. IEEE (2008)

    Google Scholar 

  9. Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E.: SAS: A Secure Aglet Server. In: Proc. of Computer Security Conference (2007)

    Google Scholar 

  10. Kallel, S., Kacem, M.H., Jmaiel, M.: Modeling and enforcing invariants of dynamic software architectures. Software and System Modeling 11, 127–149 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rekik, M., Kallel, S., Loulou, M., Kacem, A.H. (2012). Modeling Secure Mobile Agent Systems. In: Jezic, G., Kusek, M., Nguyen, NT., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems. Technologies and Applications. KES-AMSTA 2012. Lecture Notes in Computer Science(), vol 7327. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30947-2_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30947-2_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30946-5

  • Online ISBN: 978-3-642-30947-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics