Abstract
If you are going to design and develop a software agent-based real application system for electronic commerce, you would immediately learn that there exists no such secure communication between agents, which is assumed by most agent model designers. In fact, software agents, as primarily human-delegated software entities, would face almost all the risk and security threats, which human being have to face (Schneier, 1996), especially in commercial activities.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Abadi, M., and Needham, R. (1996). Prudent Engineering Practice for Cryptographic Protocols, IEEE Transactions on Software Engineer-ing, 22 (1).
Anderson, R., and Needham, R. (1995). Robustness Principles for Public Key. Protocols Lecture Notes on Computer Science, 963: 236–247.
Blaze, M., Feigenbaum, J., and Lacy, J. (1996). Decentralized Trust Management, In Proceedings 1996 IEEE Symposium on Security and Privacy.
Burrows, M., Abadi, M., and Needham, R. (1989). A logic of authentication. Technical Report 39, DEC Systems Research Center.
Chaum, D. (1985). Security without Identification: Transaction systems to make big brother Osolete, Communications of the ACM, 28 (10).
Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE, 76: 560–577.
Diffie, W., and Hellman, M.E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, IT-22: 644–654.
Ellison, C. M., Frantz, B., Lampson, B., Rivest, R., Thomas, andB. M., Ylonen, T. Simple Public Key Certificate, http://www.clark.net/pub/cme/spki.txt
Fiat, A., and Shamir, A. (1987). How to Prove Yourseldf: Pratical Solution to Identification and Signature Problems, CRYPTO’86, LNCS 263, Springer-Verlag.
Finin, T., Labrou, Y., and Mayfield, J. (1997). KQML as an agent communication language. In Jeff Bradshaw (Ed.), Software Agents, MIT Press, Cambridge.
Finin, T., Mayfield. J,, and Thirunavukkarasu, C. (1995). Secret Agents - A Security Architecture for the KQML Agent Communication Language, CIKM’95 Intelligent Information Agents Workshop, Baltimore.
Foner, L. N. (1996). A Security Architecture for Multi-Agent Matchmaking. In Proceeding of Second International Conference on Multi-Agent System,Mario Tokoro
Gerck, E. Overview of Certification Systems: X.509, CA, PGP and SKIP, http://novaware.cps.softex.br/mcg/cert.html
Gong, L. (1997). Java Security: Present and Near Future, IEEE Micro, 17 (3): 14–19.
Gong, L., Needham, R., and, Yahalom R. (1990). Reasoning about belief in cryptographic protocols. In Proceedings of the 1990, IEEE Computer Society Symposium on Research in Security and Privacy, 234–248.
Gutmann, P. X.509 Style Guide, http://www.cs.auckland.ac.nz/pgut001/x509guide.txt
He, Q. (1997). Security Module v1. 0: Design Document of Project Retsina, Robotics Institute, Carnegie Mellon University.
He, Q., Sycara, K. P.,, and Finin, T. W. (1998). Personal Security Agent: KQML-Based PKI, to appear in Autonomous Agents’98, St. Paul, Minneapolis.
IETF, URL, Public-Key Infrastructure (X.509) (pkix), http://www.ietf.org/html.charters/pkix-charter.html
Kindred, D., and Wing, J. M. (1996). Fast, Automatic Checking of Security Protocols, Proc. of the USENIX 1996 Workshop on Electronic Commerce.
Lai, X. (1992). On the Design and Security of Block Ciphers. ETH Series in Information Processing, vol. 1, Hartung-Gorre Verlag, Konstanz, Switzerland.
Lampson, B., Abadi, M., and Burrows, M. (1992). Authentication in Dis-tributed Systems: Theory and Practice ACM.
National Bureau of Standards (1988). NBS FIPS PUB 46–1, Data En-cryption Standard, U.S. Department of Commerce.
Polk, W. T., and Dodson, D. F. et al. Public Key Infrastructure: From Theory to Implementation, http://csrc.ncsl.nist.gov/pki/panel/overview.html, NIST.
Rivest, R. L., Shamir, A., and Adleman, L.M. (1978). A method for obtain-ing digital signatures and public-key crypto-systems. Communications of the ACM, 21 (2): 120–126.
Rivest, R. L. 8.z Lampson, B. SDSI - A Simple Distributed Security Infrastructure, http://theory.lcs.mit.edu/cis/sdsi.html
RSA, URL1, http://www.rsa.com/rsalabs/newfaq/ql.html
RSA, URL2, RSA Laboratories, PKCS (Public Key Crypto System) http://www.rsa.com/rsalabs/pubs/PKCS/
Schneier, B. (1996). Applied Cryptography, Second Edition, John Wiley, and Sons, Inc.
SUN, URL1, http://java.sun.com/products/jdk/1.2/docs/guide/security/index.html
SUN, URL2, http://java.sun.com/products/jdk/1.2/docs/tooldocs/solaris/jar.html
SUN, URL3, http://java.sun.com/security/
Sycara, K., Decker, K., Pannu, A., Williamson, M., and Zeng, D. (1996). Distributed Intelligent Agents. IEEE Expert, 36–45.
Zimmermann, P. R. (1995). The Official PGP User’s Guide, MIT Press.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
He, Q., Sycara, K.P., Su, Z. (2001). Security Infrastructure for Software Agent Society. In: Castelfranchi, C., Tan, YH. (eds) Trust and Deception in Virtual Societies. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-3614-5_7
Download citation
DOI: https://doi.org/10.1007/978-94-017-3614-5_7
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-5687-0
Online ISBN: 978-94-017-3614-5
eBook Packages: Springer Book Archive