Advertisement

Using Multi-agent Systems to Specify Safe and Secure Services for Virtual Organisations

  • Stefan Poslad
Conference paper
  • 391 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4324)

Abstract

Organisations increasingly interoperate with others to participate in Virtual Organisations or VO. This leads to models that need to deal with open service interaction with multiple levels of openness. Other VO security and safety challenges include decentralised operation and management, interoperability, balancing privacy versus accountability, managing error events with multiple semantics and managing anomaly events versus normal variations. The interrelationships, interactions and behaviours of agents in MAS and multi-MAS (MMAS) are analogous to those in VO. MAS provide a useful method of modelling VO, to manage their and to make them secure and safer.

Keywords

Multi Agent System Emergent Property Open Service Security Protocol Secure Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Clark, D.D., Wilson, D.R.A.: Comparison of Commercial and Military Computer Security Policies. In: IEEE Symposium of Security and Privacy, pp. 184–194 (1987)Google Scholar
  2. 2.
    Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Mathematical Foundations. MITRE Technical Report 2547, vol. I (1973)Google Scholar
  3. 3.
    Schneider, B.: Secrets and Lies: digital security in a networked world. John Wiley & Sons, Chichester (2000)Google Scholar
  4. 4.
    Nicol, D., Sanders, W., Trivedi, K.: Model-Based Evaluation: From Dependability to Security. IEEE Transactions on Dependable and Secure Computing 1(1), 48–65 (2004)CrossRefGoogle Scholar
  5. 5.
    Coase, R.H.: The Nature of the Firm. Economica 4, 386–405 (1937)CrossRefGoogle Scholar
  6. 6.
    Shao, Y.P., Lee, M.K.O., Liao, S.Y.: Virtual organizations: the key dimensions. In: Proc. Academia/Industry Working Conference on Research Challenges, pp. 3–8 (2000)Google Scholar
  7. 7.
    Coleman, J.S.: Foundations of social theory. Harvard University Press, Cambridge (1990)Google Scholar
  8. 8.
    Gligor, V.D.: Security of Emergent Properties in Ad-Hoc Networks. In: Proc. of the Security Protocols Workshop, Cambridge, UK (2004)Google Scholar
  9. 9.
    Goldberg, I.: A Pseudonymous Communications Infrastructure for the Internet, PhD thesis, Univ. of California at Berkerley (2000)Google Scholar
  10. 10.
    Garlan, D., Schmerl, B.: Model-based adaptation for self-healing systems. In: Proc. 1st workshop on Self-healing systems, Charleston, South Carolina, pp. 27–32 (2002)Google Scholar
  11. 11.
    Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41–52 (2003)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Axelrod, R.: The Dissemination of Culture: A Model with Local Convergence and Global Polarization. Journal of Conflict Resolution 41(2), 203–226 (1997)CrossRefGoogle Scholar
  13. 13.
    Poslad, S., Charlton, P.: Standardizing agent interoperability: the FIPA approach. In: Luck, M., Mařík, V., Štěpánková, O., Trappl, R. (eds.) ACAI 2001 and EASSS 2001. LNCS (LNAI), vol. 2086, pp. 98–117. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  14. 14.
    Zhang, M., Karmouch, A., Impey, R.: Towards a Secure Agent Platform based on FIPA. In: Pierre, S., Glitho, R.H. (eds.) MATA 2001. LNCS, vol. 2164, pp. 277–289. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  15. 15.
    Ghanea-Hancock, R., Gifford, I.: Top secret multi-agent systems. In: 1st Int. Workshop on security of mobile multi-agent systems (SEMAS 2001), 5th Int. Conf. Autonomous Agents, Montreal, Canada (2001)Google Scholar
  16. 16.
    Tan, J.J., Poslad, S.: Dynamic Security Reconfiguration in Semantic Open Services Environment. Eng. Apps. of AI 17, 783–797 (2004)CrossRefGoogle Scholar
  17. 17.
    Titkov, L., Poslad, S., Tan, J.J.: An Integrated Approach to User-Centered Privacy for Mobile Information Services. Applied Artificial Intelligence J. 20(2-4), 159–178 (2006)CrossRefGoogle Scholar
  18. 18.
    Tan, J.J., Poslad, S., Titkov, L.: A Semantic Approach to Harmonising Security Models for Open Services. Applied Artificial Intelligence J. 20(2-4), 353–379 (2006)CrossRefGoogle Scholar
  19. 19.
    Poslad, S., Tan, J.J., Huang, X., Zuo, L.: Middleware for semantic-based security and safety management of open services. Int. J. Web and Grid Services 1(3-4), 305–327 (2005)CrossRefGoogle Scholar
  20. 20.
    Lamport, L., Shostak, R., Pease, M.: The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems 4(3), 382–401 (1982)CrossRefzbMATHGoogle Scholar
  21. 21.
    Steinwart, I., Hush, D., Scovel, C.: A Classification Framework for Anomaly Detection. J. Machine Learning Research 6, 211–232 (2005)MathSciNetzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Stefan Poslad
    • 1
  1. 1.Department of Electronic Engineering, Queen MaryUniversity of LondonLondon

Personalised recommendations