Advertisement

A Specialised Architecture for Embedding Trust Evaluation Capabilities in Intelligent Mobile Agents

  • Justin R. Pike
  • Elizabeth M. Ehlers
  • Ockmer L. Oosthuizen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5044)

Abstract

This paper proposes an approach to enhancing mobile agent protection. Mobile agents may come under threat from malicious hosts and unscrupulous agents. In an effort to reduce risk for mobile agents and improve the robustness of mobile agent systems - the proposed trust-based approach could be used to augment existing mechanisms aimed at mobile agent protection. The approach involves the development of a component that embeds an intelligent trust evaluation capability in a participating agent. This allows user agents to delegate the task of trust evaluation to specialised evaluator agents. These evaluator agents are a simple add-on to mobile agent systems - eliminating the need to redevelop mobile agent systems.

Keywords

Trust Mobile Agents Agent Architectures and Applications 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lange, D.B., Oshima, M.: Seven Good Reasons for Mobile Agents. Communications of the ACM, 88–89 (1999)Google Scholar
  2. 2.
    Bierman, E., Cloete, E.: Classification of Malicious Host Threats in Mobile Agent Computing. In: The 2002 Annual Research Conference of SAICSIT on Enablement through Technology, pp. 141–148. SAICSIT, South Africa (2002)Google Scholar
  3. 3.
    Castelfranchi, C., Falcone, R.: Social Trust: A Cognitive Approach. Trust and Deception in Virtual Societies, pp. 55–90. Kluwer Academic Publishers, Norwell (2000)zbMATHGoogle Scholar
  4. 4.
    Castelfranchi, C., Falcone, R.: Trust in Information Sources as a Source for Trust: A Fuzzy Approach. In: 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 89–96. ACM Press, New York (2003)Google Scholar
  5. 5.
    Falcone, R., Pezzulo, G., Castelfranchi, C., Calvi, G.: Why a Cognitive Trustier Performs Better: Simulating Trust-based Contract Nets. In: 3rd International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1394–1395. IEEE Computer Society, Los Alamitos (2004)Google Scholar
  6. 6.
    Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources. In: Autonomous Agents and Multi-Agent Systems, pp. 183–198. Springer, Heidelberg (2006)Google Scholar
  7. 7.
    Huynh, D., Jennings, N.R., Shadbolt, N.R.: Developing an Integrated Trust and Reputation Model for Open Multi-Agent Systems. In: 7th International Workshop on Trust in Agent Societies, pp. 65–74 (2004)Google Scholar
  8. 8.
    Casare, S., Sichman, J.: Towards a Functional Ontology of Reputation. In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 505–511. ACM Press, New York (2005)Google Scholar
  9. 9.
    Ashri, R., Ramchurn, S.D., Sabater, J., Luck, M., Jennings, N.R.: Trust Evaluation Through Relationship Analysis. In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1005–1011. ACM Press, New York (2005)Google Scholar
  10. 10.
    Jurca, R., Faltings, B.: An Incentive Compatible Reputation Mechanism. In: 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1026–1027. ACM Press, New York (2003)Google Scholar
  11. 11.
    Karnik, N.M., Tripathi, A.R.: Design Issues in Mobile Agent Programming Systems. In: IEEE Concurrency, pp. 52–61. IEEE Computer Society, Los Alamitos (1998)Google Scholar
  12. 12.
    Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Trust Enhanced Security for Mobile Agents. In: 7th IEEE International Conference on E-Commerce Technology, pp. 231–238. IEEE, Los Alamitos (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Justin R. Pike
    • 1
  • Elizabeth M. Ehlers
    • 1
  • Ockmer L. Oosthuizen
    • 1
  1. 1.University of Johannesburg, Academy for Information TechnologyJohannesburgSouth Africa

Personalised recommendations