Abstract
Distributed network security is an important concern in modern business environments. Access to critical information and areas has to be limited to authorised users. The Herold research project aims to provide a novel way of managing distributed network security through the means of agent-based software. In this paper we present the first models, both conceptual and technical that have been produced in this project. Furthermore we examine the Paose development approach used within the project and how it contributes to Herold.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bieszczad, A., Pagurek, B., White, T.: Mobile Agents for Network Management. IEEE Communications Surveys 1(1), 2–9 (1998)
Bradshaw, J.M., Dutfield, S., Benoit, P., Woolley, J.D.: KAoS: toward an industrial-strength open agent architecture. In: Software Agents, pp. 375–418. MIT Press, Cambridge (1997)
Cabac, L., Dörges, T., Duvigneau, M., Reese, C., Wester-Ebbinghaus, M.: Application Development with Mulan. In: Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE’07), pp. 145–159 (2007)
Cabac, L.: Multi-Agent System: A Guiding Metaphor for the Organization of Software Development Projects. In: Petta, P., Müller, J.P., Klusch, M., Georgeff, M. (eds.) MATES 2007. LNCS (LNAI), vol. 4687, pp. 1–12. Springer, Heidelberg (2007)
Du, T.C., Li, E.Y., Chang, A.-P.: Mobile Agents in Distributed Network Management. Communications of the ACM 46(7), 127–132 (2003)
Duvigneau, M.: Bereitstellung einer Agentenplattform für petrinetzbasierte Agenten. Diploma thesis, University of Hamburg (2002)
Goldszmidt, G., Yemini, Y.: Delegated Agents for Network Management. IEEE Communications Magazine 36(3), 66–71 (1998)
Großklaus, A.: Policybasierte Konfiguration von verteilten Netzwerksicherheitskomponenten. Diploma thesis, University of Hamburg (2007)
Kummer, O.: Referenznetze. Logos Verlag, Berlin (2002)
Puliafito, A., Tomarchio, O.: Using Mobile Agents to Implement Flexible Network Management Strategies. Computer Communications 23(8), 708–719 (2000)
Rölke, H.: Modellierung von Agenten und Multiagentensystemen – Grundlagen und Anwendungen. Logos Verlag, Berlin (2004)
Twidle, K., Lupu, E., Dulay, N., Sloman, M.: Ponder2 – A Policy Environment for Autonomous Pervasive Systems. In: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks (POLICY ’08), pp. 245–246. IEEE Computer Society Press, Los Alamitos (2008)
Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 93–98. IEEE, Los Alamitos (2003)
Valk, R.: On Processes of Object Petri Nets. Technical Report FBI-HH-B-185/96, University of Hamburg, Department of Computer Science (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Adameit, S. et al. (2010). Modelling Distributed Network Security in a Petri Net- and Agent-Based Approach. In: Dix, J., Witteveen, C. (eds) Multiagent System Technologies. MATES 2010. Lecture Notes in Computer Science(), vol 6251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16178-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-16178-0_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16177-3
Online ISBN: 978-3-642-16178-0
eBook Packages: Computer ScienceComputer Science (R0)