Modeling Secure Mobile Agent Systems

  • Molka Rekik
  • Slim Kallel
  • Monia Loulou
  • Ahmed Hadj Kacem
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7327)

Abstract

We propose a MDA based approach for designing secure mobile agent systems. First, we define a meta-model which extends the UML deployment diagram by concepts related to the security and mobility of multi-agent systems. We propose also a UML profile as an implementation of this meta-model. Second, we project the application model into AGLETS-specific model, which describes the main functionalities of the application deployed on AGLETS as a mobile agent platform.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jarraya, T., Guessoum, Z.: Towards a Model Driven Process for Multi-Agent System. In: Burkhard, H.-D., Lindemann, G., Verbrugge, R., Varga, L.Z. (eds.) CEEMAS 2007. LNCS (LNAI), vol. 4696, pp. 256–265. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  2. 2.
    Fink, T., Koch, M., Pauls, K.: An MDA approach to Access Control Specifications Using MOF and UML Profiles. In: Proc. of the 1st VODCA, pp. 161–179 (2004)Google Scholar
  3. 3.
    Bryce, C.B.: A Security Framework for a Mobile Agent System. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 273–290. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Loulou, M., Jmaiel, M., Mosbah, M.: Dynamic Security Framework for Mobile Agent Systems: specification, verification and enforcement. IJICS, 321–336 (2009)Google Scholar
  5. 5.
    Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models to Access Control Infrastructures. ACM TOSEM 15, 39–91 (2006)CrossRefGoogle Scholar
  6. 6.
    IBM: Aglets (1996), http://www.trl.ibm.com/aglets/
  7. 7.
    Jouault, F., Kurtev, I.: Transforming Models with ATL. In: Bruel, J.-M. (ed.) MoDELS 2005. LNCS, vol. 3844, pp. 128–138. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET- Secure Agent Communication Model. In: Proc. of 11th ICCIT 2008, pp. 371–375. IEEE (2008)Google Scholar
  9. 9.
    Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E.: SAS: A Secure Aglet Server. In: Proc. of Computer Security Conference (2007)Google Scholar
  10. 10.
    Kallel, S., Kacem, M.H., Jmaiel, M.: Modeling and enforcing invariants of dynamic software architectures. Software and System Modeling 11, 127–149 (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Molka Rekik
    • 1
  • Slim Kallel
    • 1
  • Monia Loulou
    • 1
  • Ahmed Hadj Kacem
    • 1
  1. 1.ReDCAD LaboratoryUniversity of SfaxSfaxTunisia

Personalised recommendations