A Secure Multiagent Intelligent Conceptual Framework for Modeling Enterprise Resource Planning
Facing the challenge of responding more rapidly to changing markets, manufacturing industries have been motivated to explore many exciting innovations in their business practices and procedures such as MRP, ERP, EIS, CIM, and the like [1–3]. However, economic globalization is forcing companies to look further for world- class manufacturing levels. The limitation of resources, such as technology, people, or money, makes enterprises focus on their own competence as well as try to get involved with others. The core idea here is that enterprises should share their resources and abilities without owning them, in order to exploit the market opportunity that is beyond the ability of a single enterprise [4–6].
The purpose of this chapter is to investigate the use of software agents to achieve the secure system integration of ERP software packages. A secure multiagentbased intelligent ERP (SMAIERP) architecture is proposed to take advantage of the existing information systems and security techniques to simulate the secure ERP system using capabilities and characteristics of the software agent-based computer systems. The rest of the chapter is organized as follows. In the next section, we discuss the MetaMorph I as a model that describes two architectures of the multiagent system, namely, the brokering and recruiting mechanisms for selecting our model. Next architecture of SMAIERP system is provided to highlight its properties, various types, and applications in order to establish its viability for developing an ERP type system. In Sect. 30.4, security issues are discussed. Section 30.5 shows how agents communicate and synchronize with each other. Experimental environment and simulation results in a secure and nonsecure manner is described in Sect. 30.6. Finally, the implications of the SMAIERP system and future research directions are provided.
KeywordsMultiagent System Secure Manner Planning Agent Virtual Enterprise Data Request
Unable to display preview. Download preview PDF.
- 1.E. Teicholz and J. Orr, Computer Integrated Manufacturing Handbook. New York: McGraw-Hill, 1987.Google Scholar
- 2.AMICE and CIMOSA, Open System Architecture for CIM. New York: Springer Verlag, 1993.Google Scholar
- 3.P. Bernus and L. Nemes, Modeling and Methodologies for Enterprise Integration: IFIP. New York: Chapman and Hall, 1996.Google Scholar
- 4.W.H. Davidow and M.S. Malone, The Virtual Corporation: Structuring and Revitalizing the Corporation for the 21st Century. New York: Harper Collins, 1992.Google Scholar
- 5.J. Browne, “The extended enterprise—Manufacturing and the value chain,” presented at Proceedings of BASYS95, 1995.Google Scholar
- 6.L.M. Camarinha-Matos and H. Afsarnianesh, Handbook of Life Cycle Engineering: Concepts, Tools and Techniques, Chapter Virtual Enterprise: Life Cycle Supporting Tools and Technologies. New York: Chapman and Hall, 1997.Google Scholar
- 7.R. Kalakota and M. Robinson, e-Business 2.0: Roadmap for Success. Boston: Addison-Wesley, 2000.Google Scholar
- 9.C. Dahlen and J. Elfsson, “An analysis of the current and future ERP market with focus on Sweden,” Stockholm: available at http://whitepapers.techrepublic.com.com/whitepaper.aspx?&docid=3805&promo=100511, 1999.
- 10.B. Robinson and F. Wilson, “Planning for the market? Enterprise resource planning systems and the contradictions of capital,” Database for Advances in Information Systems, 32(4), pp. 21–33, 2001.Google Scholar
- 11.W. Shen and D.H. Norrie, “An agent-based approach for manufacturing enterprise integration and supply chain management,” presented at Globalization of Manufacturing in the Digital Communications Era of the 21st Century: Innovation, Agility, and the Virtual Enterprise, 1998.Google Scholar
- 12.A.D. Baker, H.V.D. Parunak, and K. Erol, “Manufacturing over the Internet and into your living room: Perspectives from the AARIA project,” ECECS Department, Technical Report 1997.Google Scholar
- 14.T. Li and Z. Fong, “A system architecture for agent based supply chain management platform,” In Proceedings of the 2003 Canadian Conference on Electrical And Computer Engineering (CCECE): Toward a Caring and Humane Technology, 2003.Google Scholar
- 16.H.C. Wong and K. Sycara, “Adding security and trust to multi-agent systems,” presented at Autonomous Agents ’99 Workshop on Deception, Fraud and Trust in Agent Societies, 1999.Google Scholar
- 17.M. Soshi and M. Maekawa, “The Saga security system: A security architecture for open distributed systems,” presented at 6th IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, 1997.Google Scholar
- 18.C. Thirunavukkarasu, T. Finin, and J. Mayfield, “Secret agents a security architecture for the KQML Agent communication language,” presented at CIKM ’95 Intelligent Information Agents Workshop, Baltimore, December 1995.Google Scholar
- 19.A. Corradi, R. Montanari, and C. Stefanelli, “Security issues in mobile agent technology. Distributed Computing Systems,” presented at 7th IEEE Workshop on Future Trends of Distributed Computing Systems, 1999.Google Scholar
- 20.L. Korba, “Towards secure agent distribution and communication,” presented at 32nd Hawaii International Conference on System Sciences, 1999.Google Scholar
- 22.K. Decker, “Environment centered analysis and design of coordination mechanisms,” Ph.D. Thesis. Amherst: Massachusetts in Department of Computer Science, 1995.Google Scholar
- 23.S. Huin, L. Luong, and K. Abhary, “Managing enterprise resources planning systems deployment in SMEs,” presented at Proceedings of the 3rd International Conference on Project Management Society of Project Management, and College of Engineering, Japan, 2002.Google Scholar
- 24.W. Stalling, Cryptography and Network Security Principles and Practice. Upper Saddle River, NJ: Prentice-Hall, 2003.Google Scholar
- 25.A. Lansky, “Localized event-based reasoning for multi-agent domains,” presented at SRI International, Stanford University, 1998.Google Scholar