Advertisement

Modeling Secure Mobile Agent Systems

  • Molka Rekik
  • Slim Kallel
  • Monia Loulou
  • Ahmed Hadj Kacem
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7327)

Abstract

We propose a MDA based approach for designing secure mobile agent systems. First, we define a meta-model which extends the UML deployment diagram by concepts related to the security and mobility of multi-agent systems. We propose also a UML profile as an implementation of this meta-model. Second, we project the application model into AGLETS-specific model, which describes the main functionalities of the application deployed on AGLETS as a mobile agent platform.

Keywords

Mobile Agent Agent System Transformation Rule Atlas Transformation Language Security Constraint 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jarraya, T., Guessoum, Z.: Towards a Model Driven Process for Multi-Agent System. In: Burkhard, H.-D., Lindemann, G., Verbrugge, R., Varga, L.Z. (eds.) CEEMAS 2007. LNCS (LNAI), vol. 4696, pp. 256–265. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  2. 2.
    Fink, T., Koch, M., Pauls, K.: An MDA approach to Access Control Specifications Using MOF and UML Profiles. In: Proc. of the 1st VODCA, pp. 161–179 (2004)Google Scholar
  3. 3.
    Bryce, C.B.: A Security Framework for a Mobile Agent System. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 273–290. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Loulou, M., Jmaiel, M., Mosbah, M.: Dynamic Security Framework for Mobile Agent Systems: specification, verification and enforcement. IJICS, 321–336 (2009)Google Scholar
  5. 5.
    Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models to Access Control Infrastructures. ACM TOSEM 15, 39–91 (2006)CrossRefGoogle Scholar
  6. 6.
    IBM: Aglets (1996), http://www.trl.ibm.com/aglets/
  7. 7.
    Jouault, F., Kurtev, I.: Transforming Models with ATL. In: Bruel, J.-M. (ed.) MoDELS 2005. LNCS, vol. 3844, pp. 128–138. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET- Secure Agent Communication Model. In: Proc. of 11th ICCIT 2008, pp. 371–375. IEEE (2008)Google Scholar
  9. 9.
    Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E.: SAS: A Secure Aglet Server. In: Proc. of Computer Security Conference (2007)Google Scholar
  10. 10.
    Kallel, S., Kacem, M.H., Jmaiel, M.: Modeling and enforcing invariants of dynamic software architectures. Software and System Modeling 11, 127–149 (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Molka Rekik
    • 1
  • Slim Kallel
    • 1
  • Monia Loulou
    • 1
  • Ahmed Hadj Kacem
    • 1
  1. 1.ReDCAD LaboratoryUniversity of SfaxSfaxTunisia

Personalised recommendations