Skip to main content

MDA-Based Approach for Implementing Secure Mobile Agent Systems

  • Conference paper
Book cover Agent-Oriented Software Engineering XIII (AOSE 2012)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7852))

Included in the following conference series:

  • 555 Accesses

Abstract

We propose an approach for implementing secure mobile agent systems. In the first step, we define a meta-model which extends the UML deployment diagram by concepts related to the security and mobility of multi-agent systems. We propose also a UML profile as an implementation of this meta-model. All defined concepts are based on formal specifications. In the second step, we project the application model in AGLETS-specific model, which describes the structure and the main functionalities of the application using the AGLETS concepts. In the third step, we generate Java skeleton code from the obtained model, and we generate also AspectJ code for enforcing security properties defined in the application model. The generated aspects will be woven, in modular way, into the functional application code.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ugurlu, S., Erdogan, N.: A Flexible Policy Architecture for Mobile Agents. In: Wiedermann, J., Tel, G., Pokorný, J., Bieliková, M., Štuller, J. (eds.) SOFSEM 2006. LNCS, vol. 3831, pp. 538–547. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Bryce, C.B.: A Security Framework for a Mobile Agent System. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 273–290. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Maria, B.A.D., da Silva, V.T., de Lucena, C.J.P.: Developing Multi-Agent Systems Based on MDA. In: Proceedings of the 17th Conference on Advanced Information Systems Engineering - CAiSE. CEUR Workshop Proceedings, vol. 161. CEUR-WS.org (2005)

    Google Scholar 

  4. Loulou, M., Jmaiel, M., Mosbah, M.: Dynamic Security Framework for Mobile Agent Systems: Specification, Verification and Enforcement. International Journal of Information and Computer Security - IJICS, 321–336 (2009)

    Google Scholar 

  5. Acceleo: Effective MDA (2007), http://www.acceleo.org/

  6. Loulou, M., Kacem, A.H., Jmaiel, M., Mosbah, M.: A Formal Security Framework for Mobile Agent Systems: Specification and Verification. In: Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems, pp. 69–76. IEEE (2008)

    Google Scholar 

  7. Woodcock, J., Davies, J.: Using Z: Specification Refinement and Proof. International Thomson Computer Press (1996)

    Google Scholar 

  8. Meisels, I., Saaltink, M.: The Z/EVES Reference Manual (for Version 1.5). Technical report, ORA Canada (1997)

    Google Scholar 

  9. Rekik, M., Kallel, S., Loulou, M., Kacem, A.H.: Modeling Secure Mobile Agent Systems. In: Jezic, G., Kusek, M., Nguyen, N.-T., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2012. LNCS, vol. 7327, pp. 330–339. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  10. IBM: Aglets (1996), http://www.trl.ibm.com/aglets/

  11. Jouault, F., Kurtev, I.: Transforming Models with ATL. In: Bruel, J.-M. (ed.) MoDELS 2005 Workshops. LNCS, vol. 3844, pp. 128–138. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An Overview of AspectJ. In: Lindskov Knudsen, J. (ed.) ECOOP 2001. LNCS, vol. 2072, pp. 327–353. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Beydoun, G., Low, G., Mouratidis, H., Henderson-Sellers, B.: A security-aware metamodel for multi-agent systems (MAS). Information and Software Technology 51, 832–845 (2009)

    Article  Google Scholar 

  14. Beydoun, G., Gonzalez-Perez, C., Henderson-Sellers, B., Low, G.: Developing and Evaluating a Generic Metamodel for MAS Work Products. In: Garcia, A., Choren, R., Lucena, C., Giorgini, P., Holvoet, T., Romanovsky, A. (eds.) SELMAS 2005. LNCS, vol. 3914, pp. 126–142. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Mouratidis, H., Giorgini, P.: Secure Tropos: a Security-Oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering 17, 285–309 (2007)

    Article  Google Scholar 

  16. Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET- Secure Agent Communication Model. In: Proceedings of 11th International Conference on Computer and Information Technology - ICCIT, pp. 371–375. IEEE (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kallel, S., Loulou, M., Rekik, M., Kacem, A.H. (2013). MDA-Based Approach for Implementing Secure Mobile Agent Systems. In: Müller, J.P., Cossentino, M. (eds) Agent-Oriented Software Engineering XIII. AOSE 2012. Lecture Notes in Computer Science, vol 7852. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39866-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39866-7_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39865-0

  • Online ISBN: 978-3-642-39866-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics