Advertisement

Protected Computing Approach: Towards the Mutual Protection of Agent Computing

  • Antonio Maña
  • Antonio Muñoz
  • Daniel Serrano
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 55)

Abstract

After a first phase of great activity in the field of multi-agent systems, researchers seemed to loose interest in the paradigm, mainly due to the lack of scenarios where the highly distributed nature of these systems could be appropriate. However, recent computing models such as ubiquitous computing and ambient intelligence have introduced the need for this type of highly distributed, autonomous and asynchronous computing mechanisms. The agent paradigm can play an important role and can suit the needs of many applications in these scenarios. In this paper we argue that the main obstacle for the practical application of multi-agent systems is the lack of appropriate security mechanisms. Moreover, we show that as a result of recent advances in security technologies, it is now possible to solve the most important security problems of agent-based systems.

Keywords

Virtual Machine Multiagent System Mobile Agent Agent System Ubiquitous Computing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lopez, J., Maña, A., Muñoz, A.: A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 977–987. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Maña, A., Muñoz, A.: Mutual Protection for Multiagent Systems. In: Proceedings of the Third International 3rd International Workshop on Safety and Security in Multiagent Systems (SASEMAS 2006) in Autonomous Agents and Multi-agents Systems (AAMAS 2006) (2006)Google Scholar
  3. 3.
    Jennings, N., Sycara, K., Wooldridge, M.: A Roadmap for Agent Research and Development. Autonomous Agents and Multiagent Systems 1(1) (1998) (forthcoming)Google Scholar
  4. 4.
    Chaib-draa, B.: Industrial Applications of Distributed AI. Communications of the ACM 38(11), 49–53 (1995)CrossRefGoogle Scholar
  5. 5.
    Jennings, N.R., Corera, J.M., Laresgoiti, I.: Developing Industrial Multiagent Systems. In: Proceedings of the First International Conference on Multiagent Systems, pp. 423–430. AAAI Press, Menlo Park (1995)Google Scholar
  6. 6.
    Wang, H., Wang, C.: Intelligent Agents in the Nuclear Industry. IEEE Computer 30(11), 28–34 (1997)Google Scholar
  7. 7.
    Schwuttke, U.M., Quan, A.G.: Enhancing Performance of Cooperating Agents in Real-Time Diagnostic Systems. In: Proceedings of the Thirteenth International Joint Conference on Artificial Intelligence (IJCAI 1993), pp. 332–337. International Joint Conferences on Artificial Intelligence, Menlo Park (1993)Google Scholar
  8. 8.
    Clements, P., Papaioannou, T., Edwards, J.: Aglets: Enabling the Virtual Enterprise. In: The Proc. of Managing Enterprises - Stakeholders, Engineering, Logistics and Achievement (ME-SELA 1997), p. 425 (1997) ISBN 1 86058 066 1Google Scholar
  9. 9.
  10. 10.
    Shepherdson, D.: The JACK Usage Report. In: The Proc of. Autonomous Agents and Multi Agents Systems (AAMAS 2003) (2003)Google Scholar
  11. 11.
  12. 12.
  13. 13.
    Alechina, N., Alechina, R., Hübner, J., Jago, M., Logan, B.: Belief revision for AgentSpeak agents. In: The Proc. of Autonomous Agents and Multi Agents Systems, Hakodate, Japan, pp. 1288–1290 (2006) ISBN:1-59593-303-4Google Scholar
  14. 14.
    Maña, A., López, J., Ortega, J., Pimentel, E., Troya, J.M.: A Framework for Secure Execution of Software. International Journal of Information Security 3(2) (2004)Google Scholar
  15. 15.
    Trusted Computing Group: TCG Specifications. Workshop on Safety and Security in Multiagent Systems (SASEMAS 2006) (2005), https://www.trustedcomputinggroup.org/specs/
  16. 16.
    Necula, G.: Proof-Carrying Code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Antonio Maña
    • 1
  • Antonio Muñoz
    • 1
  • Daniel Serrano
    • 1
  1. 1.University of Malaga 

Personalised recommendations