This chapter gathers a global view of trust and security in multiagent systems. Sharing a common rationale, each section tackles a different aspect of this area, ranging from the cryptographic protection of agents to the formalization and modeling of trust and reputation. Practical issues such as applications and the designing of testbeds are also included in the chapter.


Trust Model Multiagent System Mobile Agent User Agent Computational Trust 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    C. Sierra and F. Dignum, Agent-Mediated Electronic Commerce: Scientific and Technological Roadmap Lecture Notes in Artificial Intelligence 1991, Springer Verlag (2001), 1–18.Google Scholar
  2. [2]
    S. Marsh. Trust in distributed artificial intelligence, Lecture Notes in Artificial Intelligence 830, Springer Verlag (1994), 94–112.Google Scholar
  3. [3]
    G. Zacharia, P. Maes Trust Management through Reputation Mechanisms Applied Artificial Intelligence 14 (2000), 881–907.CrossRefGoogle Scholar
  4. [4]
    J. Sabater and C. Sierra Regret: a reputation model for gregarious societies Proc. 4th Workshop on Deception, Fraud and Trust in Agent Societies (2001), 61–69.Google Scholar
  5. [5]
    B. Yu and M. P. Singh A social mechanism for reputation management in electronic communities. Lecture Notes in Computer Science 1860 (2000), 154–165.Google Scholar
  6. [6]
    J. Sabater Trust and Reputation for agent societies PhD Thesis, Universitat Autonoma de Barcelona, 2003.Google Scholar
  7. [7]
    T.D. Huynh, N.R. Jennings and N.R. Shadbolt An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems 13(2) (2006), 119–154.CrossRefGoogle Scholar
  8. [8]
    S. Sen, A. Biswas and S. Debnath Believing others: pros and cons Proc. 4th International Conference on MulitAgent Systems (2000), 279–285.Google Scholar
  9. [9]
    J. Carbo, J. Garcia and J.M. Molina Subjective Trust Inferred by Kaiman Filtering vs. a Fuzzy Reputation. Lecture Notes in Computer Science 3289, Springer-Verlag (2004), 496–505.Google Scholar
  10. [10]
    J. Carbo, J. Garcia and J. M. Molina Convergence of agent reputation with Alpha-Beta filtering vs. a fuzzy system, Intl. Conference on Intelligent Agents, Web Technologies and Internet Commerce (2005).Google Scholar
  11. [11]
    C. Castellfranchi and R. Falcone Principles of trust for multi-agent systems: Cognitive anatomy, social importance and quantification Proc. 3rd Intl. Conference on Multi-Agent Systems (1998), 72–79.Google Scholar
  12. [12]
    S. Braynov and T. Sandholm Trust revelation in multi-agent interaction. Proc. Workshop on The Philosophy and Design of Socially Adept Technologies (2002), 57–60.Google Scholar
  13. [13]
    J. Carbo, J.M. Molina and J. Davila Trust management through fuzzy reputation Int. Journal of Cooperative Information Systems 12(1) (2003), 135–155.CrossRefGoogle Scholar
  14. [14]
    E. delAcebo and J. L. de la Rosa. A fuzzy system based approach to social modeling in multi-agent systems. Proc. 1st International Joint Conference on Autonomous Agents & Multi-Agent Systems (2002), 463–464.Google Scholar
  15. [15]
    E. del Acebo, N. Hormazábal, and J. L. de la Rosa. Beyond trust, fuzzy contextual corrective filters for reliability assessment in MAS. application to the art testbed. Proc. Trust in Agent Societies Workshop. The Seventh International Joint Conference on Autonomous Agents & Multi-agent Systems, (2007)Google Scholar
  16. [16]
    E. del Acebo, A. Oiler, J. L. de la Rosa, and A. Ligeza. Statistic criteria for fuzzy systems quality evaluation. IEA/AIE (vol. 2) Lecture Notes in Computer Science vol. 1416, Springer (1998), 877–887.Google Scholar
  17. [17]
    K. Fullam, T. Klos, G. Muller, J. Sabater, A. Schlosser, Z. Topol, K. S. Barber, J. Rosenschein, L. Vercouter, and M. Voss. A Specification of the Agent Reputation and Trust (ART) Testbed: Experimentation and Competition for Trust in Agent Societies. Proc 4th International Joint Conference on Autonomous Agents and Multi-Agent Systems, ACM Press (2005), 512–518.Google Scholar
  18. [18]
    J.S.R. Jang, C.T. Sun, and E. Mizutani. Neuro-Fuzzy and Soft Computing. MATLAB Curriculum Series. Prentice-Hall, first edition, 1997.Google Scholar
  19. [19]
    Merriam-Webster. Merriam-webster online dictionary, 2007. Scholar
  20. [20]
    R. Hermoso, H. Billhardt, and S. Ossowski. Integrating trust in virtual organisations. Proc. Workshop on Coordination, Organization, Institutions and Norms in agent systems (2006), 121–133.Google Scholar
  21. [21]
    M. Schumacher and S. Ossowski. The governing environment. Environments for Multi-Agent Systems II, vol. 3830, Springer-Verlag (2006), 88–104.CrossRefGoogle Scholar
  22. [22]
    T. Dong Huynh, N. R. Jennings, and N. R. Shadbolt. FIRE: An integrated trust and reputation model for open multi-agent systems. Proc. Proceedings of the 16th European Conference on Artificial Intelligence (2004).Google Scholar
  23. [23]
    S. D. Ramchurn, C. Sierra, L. Godó, and N. R. Jennings. A computational trust model for multi-agent interactions based on confidence and reputation. Proc. 6th International Workshop of Deception, Fraud and Trust in Agent Societies (2003), 69–75.Google Scholar
  24. [24]
    Y. Li, Z. A. Bandar, and D. McLean. An approach for measuring semantic similarity between words using multiple information sources. IEEE Transactions on Knowledge and Data Engineering 15(4) (2003), 871–882CrossRefGoogle Scholar
  25. [25]
    P. Ganesan, H. Garcia-Molina, and J. Widom. Exploiting hierarchical domain structure to compute similarity. ACM Trans. Inf. Syst., 21(1) (2003), 64–93.CrossRefGoogle Scholar
  26. [26]
    A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. Proc. 33rd Hawaii International Conference on Systems Sciences (2000).Google Scholar
  27. [27]
    K. Barber and J. Kim. Belief revision process based on trust: Simulation experiments. Proc. 4th Workshop on Deception, Fraud and Trust in Agent Societies (2004)Google Scholar
  28. [28]
    R. Crowder, G. Hughes, and W. Hall. Approaches to locating expertise using corporate knowledge. International Journal of Intelligent Systems in Accounting Finance & Management (2002), 185–200.Google Scholar
  29. [29]
    P. Dillenbourg. Introduction: What Do You Mean By “Collaborative Learning” ? Collaborative Learning Cognitive and Computational Approaches. Dillenbourg (Ed.). Elsevier Science, 1999.Google Scholar
  30. [30]
    L. Mui, A. Halberstadt, and M. Mohtashemi. Notions of reputation in multi-agents systems: A review. Proc. International Conference on Autonomous Agents and Multi-Agents Systems (2002), 280–287.Google Scholar
  31. [31]
    S. Wasserman and J. Glaskiewics. Advances in Social Networks Analysis. Sage Publications, 1994.Google Scholar
  32. [32]
    ART testbed. Scholar
  33. [33]
    R. Conte and M. Paolucci. Reputation in artificial societies: Social beliefs for social order. Kluwer Academic Publishers, 2002.Google Scholar
  34. [34]
    S. D. Ramchurn, C. Sierra, L. Godo, and N. R. Jennings. Devising a trust model for multi-agent interactions using confidence and reputation. Int. J. of Applied Artificial Intelligence, 18 (2004), 833–852.CrossRefGoogle Scholar
  35. [35]
    J. Sabater, M. Paolucci, and R. Conte. Repage: Reputation and image among limited autonomous partners. Journal of Artificial Societies and Social Simulation, 9(2) (2006).Google Scholar
  36. [36]
    J. Sabater-Mir and M. Paolucci. On representation and aggregation of social evaluations in computational trust and reputation models. International Journal of Approximate Reasoning, In press, (2007).Google Scholar
  37. [37]
    C. Sierra and J. Debenham. An information-based model for trust. Proc. 4th Intl Conference on Autonomous Agents and Multi-Agent Systems, ACM Press (2005), 497–504.Google Scholar
  38. [38]
    C. Sierra and J. Debenham. Information-based agency. Proc. 20th Intl Joint Conference on Artificial Intelligence (2007)Google Scholar
  39. [39]
    W. Jansen and T. Karygiannis. Mobile Agent Security, National Institute of Standards and Technology. Special publication 800–19 (2000).Google Scholar
  40. [40]
    S. M. Chess Security issues in mobile code systems. Lecture Notes in Computer Science, vol. 1419, Springer-Verlag (1998), 1–14.CrossRefGoogle Scholar
  41. [41]
    V. Roth. On the robustness of some cryptographic protocols for mobile agent protection. Lecture Notes in Computer Science, vol. 2240 (2001), 1–14.Google Scholar
  42. [42]
    V. Roth. Empowering mobile software agents. Proc. 6th IEEE Mobile Agents Conference, Lecture Notes in Computer Science, vol. 2535, Spinger-Verlag (2002), 47–63.Google Scholar
  43. [43]
    S. Robles, J. Mir, and J. Borrell. Marism-a: An architecture for mobile agents with recursive itinerary and secure migration. Proc. 2nd. IW on Security of Mobile Multi-Agent Systems (2002).Google Scholar
  44. [44]
    J. Mir and J. Borrell. Protecting mobile agent itineraries. Proc. Mobile Agents for Telecommunication Applications. Lecture Notes in Computer Science, vol. 2881, Springer-Verlag (2003), 275–285.Google Scholar
  45. [45]
    P. M. Vieira-Marques, S. Robles, J. Cucurull, R. J. Cruz-Correia, G. Navarro, and R. Martí. Secure Integration of Distributed Medical Data Using Mobile Agents. IEEE Intelligent Systems 21(6) (2006), 47–54.CrossRefGoogle Scholar
  46. [46]
    C. Garrigues, S. Robles, A. Moratalla, and J. Borrell, Building Secure Mobile Agents using Cryptographic Architectures. Proc. 2nd European Workshop on Multi-Agent Systems (2004), 243–254.Google Scholar
  47. [47]
    J. Ametller, S. Robles, and J. A. Ortega, Self-Protected Mobile Agents. Proc. of the 3rd Intl Joint Conference on Autonomous Agents and Multi-Agent Systems. IEEE Computer Society (2004), 362–367.Google Scholar
  48. [48]
    I. Marsá-Maestre. A hierarchical, agent-based architecture for smart spaces. Technical Report TR-2005-101, Grupo de Ingeniería de Servicios Telemáticos, (2005).Google Scholar
  49. [49]
    F. Stajano, R. Anderson. The resurrecting duckling: security issues for ubiquitous computing. IEEE Computer 35 (2002), 22–26.Google Scholar
  50. [50]
    C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas and T. Ylonen. SPKI certificate theory. IETF RFC 2693 (1999).Google Scholar
  51. [51]
    D. Ferraiolo and D. Kuhn. Role based access control. Proc. 15th National Computer Security Conference (1992).Google Scholar

Copyright information

© Birkhäuser Verlag Basel/Switzerland 2007

Authors and Affiliations

  • Sergi Robles
    • 1
  1. 1.Universitat Autònoma de BarcelonaBellaterraSpain

Personalised recommendations