Skip to main content

Protection of Multiagent Systems

  • Conference paper
  • First Online:
Computational Science and Its Applications — ICCSA 2003 (ICCSA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2669))

Included in the following conference series:

Abstract

The use of intelligent agents to improve business to business (B2B) communications is starting to be adopted by more and more companies. The main reason is that intelligent agents are able to multiply the number of agreements between suppliers and customers. However, due to the type of information managed by agents those negotiations must be protected in order to avoid fraud and misrepresentation. Communications between agents must be authenticated and, once an agreement is signed, none of the parties should be able to repudiate its signature, and hence their agreement. Furthermore, some confidentiality services must be supplied, allowing to hide some message contents or identities.Security has important implications to the participants of the market, because they will trust the system according to the level of security supplied. This paper shows how RETSINA agents may obtain those security services using trust management and security mechanisms. Our approach uses the trust infrastructure defined by [3] for RETSINA and the security services supplied by the new IPSEC protocols [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Doraswamy N. and Harkins D. IPSec, The new Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice Hall. 1999

    Google Scholar 

  2. Sycara K., Pannu A., Williamson M., Zeng D. and Decker K. Distributed Intelligent Agents. In IEEE expert, pages 36–45, 1996

    Google Scholar 

  3. Wong H. and Sycara K. Adding Security and Trust to Multi-Agents Systems. Carnegie Mellon University. 1999

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sierra, J.M., Hernández, J.C., Ponce, E., Ribagorda, A. (2003). Protection of Multiagent Systems. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds) Computational Science and Its Applications — ICCSA 2003. ICCSA 2003. Lecture Notes in Computer Science, vol 2669. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44842-X_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-44842-X_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40156-8

  • Online ISBN: 978-3-540-44842-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics