Skip to main content

Security Infrastructure for Software Agent Society

  • Chapter

Abstract

If you are going to design and develop a software agent-based real application system for electronic commerce, you would immediately learn that there exists no such secure communication between agents, which is assumed by most agent model designers. In fact, software agents, as primarily human-delegated software entities, would face almost all the risk and security threats, which human being have to face (Schneier, 1996), especially in commercial activities.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abadi, M., and Needham, R. (1996). Prudent Engineering Practice for Cryptographic Protocols, IEEE Transactions on Software Engineer-ing, 22 (1).

    Google Scholar 

  • Anderson, R., and Needham, R. (1995). Robustness Principles for Public Key. Protocols Lecture Notes on Computer Science, 963: 236–247.

    Article  Google Scholar 

  • Blaze, M., Feigenbaum, J., and Lacy, J. (1996). Decentralized Trust Management, In Proceedings 1996 IEEE Symposium on Security and Privacy.

    Google Scholar 

  • Burrows, M., Abadi, M., and Needham, R. (1989). A logic of authentication. Technical Report 39, DEC Systems Research Center.

    Google Scholar 

  • Chaum, D. (1985). Security without Identification: Transaction systems to make big brother Osolete, Communications of the ACM, 28 (10).

    Google Scholar 

  • Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE, 76: 560–577.

    Article  Google Scholar 

  • Diffie, W., and Hellman, M.E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, IT-22: 644–654.

    Google Scholar 

  • Ellison, C. M., Frantz, B., Lampson, B., Rivest, R., Thomas, andB. M., Ylonen, T. Simple Public Key Certificate, http://www.clark.net/pub/cme/spki.txt

  • Fiat, A., and Shamir, A. (1987). How to Prove Yourseldf: Pratical Solution to Identification and Signature Problems, CRYPTO’86, LNCS 263, Springer-Verlag.

    Google Scholar 

  • Finin, T., Labrou, Y., and Mayfield, J. (1997). KQML as an agent communication language. In Jeff Bradshaw (Ed.), Software Agents, MIT Press, Cambridge.

    Google Scholar 

  • Finin, T., Mayfield. J,, and Thirunavukkarasu, C. (1995). Secret Agents - A Security Architecture for the KQML Agent Communication Language, CIKM’95 Intelligent Information Agents Workshop, Baltimore.

    Google Scholar 

  • Foner, L. N. (1996). A Security Architecture for Multi-Agent Matchmaking. In Proceeding of Second International Conference on Multi-Agent System,Mario Tokoro

    Google Scholar 

  • Gerck, E. Overview of Certification Systems: X.509, CA, PGP and SKIP, http://novaware.cps.softex.br/mcg/cert.html

  • Gong, L. (1997). Java Security: Present and Near Future, IEEE Micro, 17 (3): 14–19.

    Article  Google Scholar 

  • Gong, L., Needham, R., and, Yahalom R. (1990). Reasoning about belief in cryptographic protocols. In Proceedings of the 1990, IEEE Computer Society Symposium on Research in Security and Privacy, 234–248.

    Google Scholar 

  • Gutmann, P. X.509 Style Guide, http://www.cs.auckland.ac.nz/pgut001/x509guide.txt

  • He, Q. (1997). Security Module v1. 0: Design Document of Project Retsina, Robotics Institute, Carnegie Mellon University.

    Google Scholar 

  • He, Q., Sycara, K. P.,, and Finin, T. W. (1998). Personal Security Agent: KQML-Based PKI, to appear in Autonomous Agents’98, St. Paul, Minneapolis.

    Google Scholar 

  • IETF, URL, Public-Key Infrastructure (X.509) (pkix), http://www.ietf.org/html.charters/pkix-charter.html

  • Kindred, D., and Wing, J. M. (1996). Fast, Automatic Checking of Security Protocols, Proc. of the USENIX 1996 Workshop on Electronic Commerce.

    Google Scholar 

  • Lai, X. (1992). On the Design and Security of Block Ciphers. ETH Series in Information Processing, vol. 1, Hartung-Gorre Verlag, Konstanz, Switzerland.

    Google Scholar 

  • Lampson, B., Abadi, M., and Burrows, M. (1992). Authentication in Dis-tributed Systems: Theory and Practice ACM.

    Google Scholar 

  • National Bureau of Standards (1988). NBS FIPS PUB 46–1, Data En-cryption Standard, U.S. Department of Commerce.

    Google Scholar 

  • Polk, W. T., and Dodson, D. F. et al. Public Key Infrastructure: From Theory to Implementation, http://csrc.ncsl.nist.gov/pki/panel/overview.html, NIST.

  • Rivest, R. L., Shamir, A., and Adleman, L.M. (1978). A method for obtain-ing digital signatures and public-key crypto-systems. Communications of the ACM, 21 (2): 120–126.

    Article  MathSciNet  MATH  Google Scholar 

  • Rivest, R. L. 8.z Lampson, B. SDSI - A Simple Distributed Security Infrastructure, http://theory.lcs.mit.edu/cis/sdsi.html

  • RSA, URL1, http://www.rsa.com/rsalabs/newfaq/ql.html

  • RSA, URL2, RSA Laboratories, PKCS (Public Key Crypto System) http://www.rsa.com/rsalabs/pubs/PKCS/

    Google Scholar 

  • Schneier, B. (1996). Applied Cryptography, Second Edition, John Wiley, and Sons, Inc.

    Google Scholar 

  • SUN, URL1, http://java.sun.com/products/jdk/1.2/docs/guide/security/index.html

  • SUN, URL2, http://java.sun.com/products/jdk/1.2/docs/tooldocs/solaris/jar.html

  • SUN, URL3, http://java.sun.com/security/

  • Sycara, K., Decker, K., Pannu, A., Williamson, M., and Zeng, D. (1996). Distributed Intelligent Agents. IEEE Expert, 36–45.

    Google Scholar 

  • Zimmermann, P. R. (1995). The Official PGP User’s Guide, MIT Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

He, Q., Sycara, K.P., Su, Z. (2001). Security Infrastructure for Software Agent Society. In: Castelfranchi, C., Tan, YH. (eds) Trust and Deception in Virtual Societies. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-3614-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-3614-5_7

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-5687-0

  • Online ISBN: 978-94-017-3614-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics