Skip to main content

Abstract

This chapter gathers a global view of trust and security in multiagent systems. Sharing a common rationale, each section tackles a different aspect of this area, ranging from the cryptographic protection of agents to the formalization and modeling of trust and reputation. Practical issues such as applications and the designing of testbeds are also included in the chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. Sierra and F. Dignum, Agent-Mediated Electronic Commerce: Scientific and Technological Roadmap Lecture Notes in Artificial Intelligence 1991, Springer Verlag (2001), 1–18.

    Google Scholar 

  2. S. Marsh. Trust in distributed artificial intelligence, Lecture Notes in Artificial Intelligence 830, Springer Verlag (1994), 94–112.

    Google Scholar 

  3. G. Zacharia, P. Maes Trust Management through Reputation Mechanisms Applied Artificial Intelligence 14 (2000), 881–907.

    Article  Google Scholar 

  4. J. Sabater and C. Sierra Regret: a reputation model for gregarious societies Proc. 4th Workshop on Deception, Fraud and Trust in Agent Societies (2001), 61–69.

    Google Scholar 

  5. B. Yu and M. P. Singh A social mechanism for reputation management in electronic communities. Lecture Notes in Computer Science 1860 (2000), 154–165.

    Google Scholar 

  6. J. Sabater Trust and Reputation for agent societies PhD Thesis, Universitat Autonoma de Barcelona, 2003.

    Google Scholar 

  7. T.D. Huynh, N.R. Jennings and N.R. Shadbolt An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems 13(2) (2006), 119–154.

    Article  Google Scholar 

  8. S. Sen, A. Biswas and S. Debnath Believing others: pros and cons Proc. 4th International Conference on MulitAgent Systems (2000), 279–285.

    Google Scholar 

  9. J. Carbo, J. Garcia and J.M. Molina Subjective Trust Inferred by Kaiman Filtering vs. a Fuzzy Reputation. Lecture Notes in Computer Science 3289, Springer-Verlag (2004), 496–505.

    Google Scholar 

  10. J. Carbo, J. Garcia and J. M. Molina Convergence of agent reputation with Alpha-Beta filtering vs. a fuzzy system, Intl. Conference on Intelligent Agents, Web Technologies and Internet Commerce (2005).

    Google Scholar 

  11. C. Castellfranchi and R. Falcone Principles of trust for multi-agent systems: Cognitive anatomy, social importance and quantification Proc. 3rd Intl. Conference on Multi-Agent Systems (1998), 72–79.

    Google Scholar 

  12. S. Braynov and T. Sandholm Trust revelation in multi-agent interaction. Proc. Workshop on The Philosophy and Design of Socially Adept Technologies (2002), 57–60.

    Google Scholar 

  13. J. Carbo, J.M. Molina and J. Davila Trust management through fuzzy reputation Int. Journal of Cooperative Information Systems 12(1) (2003), 135–155.

    Article  Google Scholar 

  14. E. delAcebo and J. L. de la Rosa. A fuzzy system based approach to social modeling in multi-agent systems. Proc. 1st International Joint Conference on Autonomous Agents & Multi-Agent Systems (2002), 463–464.

    Google Scholar 

  15. E. del Acebo, N. Hormazábal, and J. L. de la Rosa. Beyond trust, fuzzy contextual corrective filters for reliability assessment in MAS. application to the art testbed. Proc. Trust in Agent Societies Workshop. The Seventh International Joint Conference on Autonomous Agents & Multi-agent Systems, (2007)

    Google Scholar 

  16. E. del Acebo, A. Oiler, J. L. de la Rosa, and A. Ligeza. Statistic criteria for fuzzy systems quality evaluation. IEA/AIE (vol. 2) Lecture Notes in Computer Science vol. 1416, Springer (1998), 877–887.

    Google Scholar 

  17. K. Fullam, T. Klos, G. Muller, J. Sabater, A. Schlosser, Z. Topol, K. S. Barber, J. Rosenschein, L. Vercouter, and M. Voss. A Specification of the Agent Reputation and Trust (ART) Testbed: Experimentation and Competition for Trust in Agent Societies. Proc 4th International Joint Conference on Autonomous Agents and Multi-Agent Systems, ACM Press (2005), 512–518.

    Google Scholar 

  18. J.S.R. Jang, C.T. Sun, and E. Mizutani. Neuro-Fuzzy and Soft Computing. MATLAB Curriculum Series. Prentice-Hall, first edition, 1997.

    Google Scholar 

  19. Merriam-Webster. Merriam-webster online dictionary, 2007. http://www.m-w.com/.

    Google Scholar 

  20. R. Hermoso, H. Billhardt, and S. Ossowski. Integrating trust in virtual organisations. Proc. Workshop on Coordination, Organization, Institutions and Norms in agent systems (2006), 121–133.

    Google Scholar 

  21. M. Schumacher and S. Ossowski. The governing environment. Environments for Multi-Agent Systems II, vol. 3830, Springer-Verlag (2006), 88–104.

    Article  Google Scholar 

  22. T. Dong Huynh, N. R. Jennings, and N. R. Shadbolt. FIRE: An integrated trust and reputation model for open multi-agent systems. Proc. Proceedings of the 16th European Conference on Artificial Intelligence (2004).

    Google Scholar 

  23. S. D. Ramchurn, C. Sierra, L. Godó, and N. R. Jennings. A computational trust model for multi-agent interactions based on confidence and reputation. Proc. 6th International Workshop of Deception, Fraud and Trust in Agent Societies (2003), 69–75.

    Google Scholar 

  24. Y. Li, Z. A. Bandar, and D. McLean. An approach for measuring semantic similarity between words using multiple information sources. IEEE Transactions on Knowledge and Data Engineering 15(4) (2003), 871–882

    Article  Google Scholar 

  25. P. Ganesan, H. Garcia-Molina, and J. Widom. Exploiting hierarchical domain structure to compute similarity. ACM Trans. Inf. Syst., 21(1) (2003), 64–93.

    Article  Google Scholar 

  26. A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. Proc. 33rd Hawaii International Conference on Systems Sciences (2000).

    Google Scholar 

  27. K. Barber and J. Kim. Belief revision process based on trust: Simulation experiments. Proc. 4th Workshop on Deception, Fraud and Trust in Agent Societies (2004)

    Google Scholar 

  28. R. Crowder, G. Hughes, and W. Hall. Approaches to locating expertise using corporate knowledge. International Journal of Intelligent Systems in Accounting Finance & Management (2002), 185–200.

    Google Scholar 

  29. P. Dillenbourg. Introduction: What Do You Mean By “Collaborative Learning” ? Collaborative Learning Cognitive and Computational Approaches. Dillenbourg (Ed.). Elsevier Science, 1999.

    Google Scholar 

  30. L. Mui, A. Halberstadt, and M. Mohtashemi. Notions of reputation in multi-agents systems: A review. Proc. International Conference on Autonomous Agents and Multi-Agents Systems (2002), 280–287.

    Google Scholar 

  31. S. Wasserman and J. Glaskiewics. Advances in Social Networks Analysis. Sage Publications, 1994.

    Google Scholar 

  32. ART testbed. http://www.art-testbed.net.

    Google Scholar 

  33. R. Conte and M. Paolucci. Reputation in artificial societies: Social beliefs for social order. Kluwer Academic Publishers, 2002.

    Google Scholar 

  34. S. D. Ramchurn, C. Sierra, L. Godo, and N. R. Jennings. Devising a trust model for multi-agent interactions using confidence and reputation. Int. J. of Applied Artificial Intelligence, 18 (2004), 833–852.

    Article  Google Scholar 

  35. J. Sabater, M. Paolucci, and R. Conte. Repage: Reputation and image among limited autonomous partners. Journal of Artificial Societies and Social Simulation, 9(2) (2006).

    Google Scholar 

  36. J. Sabater-Mir and M. Paolucci. On representation and aggregation of social evaluations in computational trust and reputation models. International Journal of Approximate Reasoning, In press, (2007).

    Google Scholar 

  37. C. Sierra and J. Debenham. An information-based model for trust. Proc. 4th Intl Conference on Autonomous Agents and Multi-Agent Systems, ACM Press (2005), 497–504.

    Google Scholar 

  38. C. Sierra and J. Debenham. Information-based agency. Proc. 20th Intl Joint Conference on Artificial Intelligence (2007)

    Google Scholar 

  39. W. Jansen and T. Karygiannis. Mobile Agent Security, National Institute of Standards and Technology. Special publication 800–19 (2000).

    Google Scholar 

  40. S. M. Chess Security issues in mobile code systems. Lecture Notes in Computer Science, vol. 1419, Springer-Verlag (1998), 1–14.

    Article  Google Scholar 

  41. V. Roth. On the robustness of some cryptographic protocols for mobile agent protection. Lecture Notes in Computer Science, vol. 2240 (2001), 1–14.

    Google Scholar 

  42. V. Roth. Empowering mobile software agents. Proc. 6th IEEE Mobile Agents Conference, Lecture Notes in Computer Science, vol. 2535, Spinger-Verlag (2002), 47–63.

    Google Scholar 

  43. S. Robles, J. Mir, and J. Borrell. Marism-a: An architecture for mobile agents with recursive itinerary and secure migration. Proc. 2nd. IW on Security of Mobile Multi-Agent Systems (2002).

    Google Scholar 

  44. J. Mir and J. Borrell. Protecting mobile agent itineraries. Proc. Mobile Agents for Telecommunication Applications. Lecture Notes in Computer Science, vol. 2881, Springer-Verlag (2003), 275–285.

    Google Scholar 

  45. P. M. Vieira-Marques, S. Robles, J. Cucurull, R. J. Cruz-Correia, G. Navarro, and R. Martí. Secure Integration of Distributed Medical Data Using Mobile Agents. IEEE Intelligent Systems 21(6) (2006), 47–54.

    Article  Google Scholar 

  46. C. Garrigues, S. Robles, A. Moratalla, and J. Borrell, Building Secure Mobile Agents using Cryptographic Architectures. Proc. 2nd European Workshop on Multi-Agent Systems (2004), 243–254.

    Google Scholar 

  47. J. Ametller, S. Robles, and J. A. Ortega, Self-Protected Mobile Agents. Proc. of the 3rd Intl Joint Conference on Autonomous Agents and Multi-Agent Systems. IEEE Computer Society (2004), 362–367.

    Google Scholar 

  48. I. Marsá-Maestre. A hierarchical, agent-based architecture for smart spaces. Technical Report TR-2005-101, Grupo de Ingeniería de Servicios Telemáticos, http://ist.aut.uah.es (2005).

    Google Scholar 

  49. F. Stajano, R. Anderson. The resurrecting duckling: security issues for ubiquitous computing. IEEE Computer 35 (2002), 22–26.

    Google Scholar 

  50. C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas and T. Ylonen. SPKI certificate theory. IETF RFC 2693 (1999).

    Google Scholar 

  51. D. Ferraiolo and D. Kuhn. Role based access control. Proc. 15th National Computer Security Conference (1992).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Birkhäuser Verlag Basel/Switzerland

About this chapter

Cite this chapter

Robles, S. (2007). Trust and Security. In: Moreno, A., Pavón, J. (eds) Issues in Multi-Agent Systems. Whitestein Series in Software Agent Technologies and Autonomic Computing. Birkhäuser Basel. https://doi.org/10.1007/978-3-7643-8543-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-7643-8543-9_4

  • Publisher Name: Birkhäuser Basel

  • Print ISBN: 978-3-7643-8542-2

  • Online ISBN: 978-3-7643-8543-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics