Skip to main content

Modelling Distributed Network Security in a Petri Net- and Agent-Based Approach

  • Conference paper
Book cover Multiagent System Technologies (MATES 2010)

Abstract

Distributed network security is an important concern in modern business environments. Access to critical information and areas has to be limited to authorised users. The Herold research project aims to provide a novel way of managing distributed network security through the means of agent-based software. In this paper we present the first models, both conceptual and technical that have been produced in this project. Furthermore we examine the Paose development approach used within the project and how it contributes to Herold.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bieszczad, A., Pagurek, B., White, T.: Mobile Agents for Network Management. IEEE Communications Surveys 1(1), 2–9 (1998)

    Article  MATH  Google Scholar 

  2. Bradshaw, J.M., Dutfield, S., Benoit, P., Woolley, J.D.: KAoS: toward an industrial-strength open agent architecture. In: Software Agents, pp. 375–418. MIT Press, Cambridge (1997)

    Google Scholar 

  3. Cabac, L., Dörges, T., Duvigneau, M., Reese, C., Wester-Ebbinghaus, M.: Application Development with Mulan. In: Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE’07), pp. 145–159 (2007)

    Google Scholar 

  4. Cabac, L.: Multi-Agent System: A Guiding Metaphor for the Organization of Software Development Projects. In: Petta, P., Müller, J.P., Klusch, M., Georgeff, M. (eds.) MATES 2007. LNCS (LNAI), vol. 4687, pp. 1–12. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Du, T.C., Li, E.Y., Chang, A.-P.: Mobile Agents in Distributed Network Management. Communications of the ACM 46(7), 127–132 (2003)

    Article  Google Scholar 

  6. Duvigneau, M.: Bereitstellung einer Agentenplattform für petrinetzbasierte Agenten. Diploma thesis, University of Hamburg (2002)

    Google Scholar 

  7. Goldszmidt, G., Yemini, Y.: Delegated Agents for Network Management. IEEE Communications Magazine 36(3), 66–71 (1998)

    Article  Google Scholar 

  8. Großklaus, A.: Policybasierte Konfiguration von verteilten Netzwerksicherheitskomponenten. Diploma thesis, University of Hamburg (2007)

    Google Scholar 

  9. Kummer, O.: Referenznetze. Logos Verlag, Berlin (2002)

    Google Scholar 

  10. Puliafito, A., Tomarchio, O.: Using Mobile Agents to Implement Flexible Network Management Strategies. Computer Communications 23(8), 708–719 (2000)

    Article  Google Scholar 

  11. Rölke, H.: Modellierung von Agenten und Multiagentensystemen – Grundlagen und Anwendungen. Logos Verlag, Berlin (2004)

    Google Scholar 

  12. Twidle, K., Lupu, E., Dulay, N., Sloman, M.: Ponder2 – A Policy Environment for Autonomous Pervasive Systems. In: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks (POLICY ’08), pp. 245–246. IEEE Computer Society Press, Los Alamitos (2008)

    Chapter  Google Scholar 

  13. Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 93–98. IEEE, Los Alamitos (2003)

    Google Scholar 

  14. Valk, R.: On Processes of Object Petri Nets. Technical Report FBI-HH-B-185/96, University of Hamburg, Department of Computer Science (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Adameit, S. et al. (2010). Modelling Distributed Network Security in a Petri Net- and Agent-Based Approach. In: Dix, J., Witteveen, C. (eds) Multiagent System Technologies. MATES 2010. Lecture Notes in Computer Science(), vol 6251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16178-0_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16178-0_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16177-3

  • Online ISBN: 978-3-642-16178-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics