Research Journal of Applied Sciences

Year: 2014
Volume: 9
Issue: 9
Page No. 583 - 589

Techniques for Multi-Agent System Security

Authors : Olumide Simeon Ogunnusi, Obasan Adebola Olukayode and Michael Kolade Adu

References

Abadi, M. and R. Needham, 1996. Prudent engineering practice for cryptographic protocols. IEEE Trans. Software Eng., 22: 6-15.
CrossRef  |  

Aggarwal, S., S. Bhardwaj and P. Kumar, 2012. Security approaches for mobile multi-agent system. Int. J. Emerging Technol. Adv. Eng., 2: 681-687.
Direct Link  |  

Ahuja, P. and V. Sharma, 2012. A review on mobile agent security. Int. J. Recent Technol. Eng., 1: 83-88.
Direct Link  |  

Batten, L.M., 2013. Public Key Cryptography: Applications and Attacks. Vol. 16, John Wiley and Sons, New York, ISBN: 9781118482315, Pages: 224.

Bellavista, P., A. Corradi, R. Montanari and C. Stefanelli, 2000. How a secure and open mobile agent framework suits electronic commerce applications. http://wendang.baidu.com/view/742eca124431b90d6c85c73d.html.

Borselius, N., 2002. Mobile agent security. Electr. Commun. Eng. J., 14: 211-218.
CrossRef  |  

Braubach, L., K. Jander and A. Pokahr, 2013. A practical security infrastructure for distributed agent applications. Proceedings of the 11th German Conference on Multiagent System Technologies, September 16-20, 2013, Koblenz, Germany, pp: 29-43.

Cavalcante, R.C., I.I. Bittencourt, A.P. da Silva, M. Silva, E. Costa and R. Santos, 2012. A survey of security in multi-agent systems. Expert Syst. Appl., 39: 4835-4846.
CrossRef  |  Direct Link  |  

Clauβ, S. and M. Kohntopp, 2001. Identity management and its support of multilateral security. Comput. Networks, 37: 205-219.
CrossRef  |  Direct Link  |  

Garrigues, C., S. Robles, J. Borrell and G. Navarro-Arribas, 2010. Promoting the development of secure mobile agent applications. J. Syst. Software, 83: 959-971.
CrossRef  |  

Gregori, M.E., J.P. Camara and G.A. Bada, 2006. A jabber-based multi-agent system platform. Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems, May 8-12, 2006, Hakodate, Japan, pp: 1282-1284.

Gunupudi, V. and S.R. Tate, 2006. SAgent: A security framework for JADE. Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems, May 8-12, 2006, Hakodate, Japan, pp: 1116-1118.

Jansen, W. and T. Karygiannis, 1998. Mobile agent security. Defense Technical Information Center-DTIC. http://www.dtic.mil/docs/citations/ADA391526.

Karnik, N.M. and A.R. Tripathi, 2001. Security in the Ajanta mobile agent system. Software: Practice Exp., 31: 301-329.
CrossRef  |  

Loulou, M., M. Jmaiel, A. Hadj Kacem and M. Mosbah, 2006. A conceptual model for secure mobile agent systems. Proceedings of the International Conference on Computational Intelligence and Security, November 3-6, 2006, Guangzhou, China, pp: 524-527.

Malik, N.S., F. Kupzog and M. Sonntag, 2010. An approach to secure mobile agents in automatic meter reading. Proceedings of the IEEE International Conference on Cyberworlds, October 20-22, 2010, Singapore, pp: 187-193.

Marques, P.J., L.M. Silva and J.G. Silva, 1999. Security mechanisms for using mobile agents in electronic commerce. Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, October 19-22, 1999, Lausanne, pp: 378-383.

McDonald, J.T., A. Yasinsac and W. Thompson, 2005. Trust in mobile agent systems. Technical Report, Department of Host Science, Florida State University.

Oey, M.A., M Warnier and F.M.T. Brazier, 2010. Security in large-scale open distributed multi-agent systems. Autonomous Agents, 6: 108-130.

Picco, G.P., 2001. Mobile agents: An introduction. Microprocessors Microsyst., 25: 65-74.
CrossRef  |  Direct Link  |  

Quillinan, T.B., M. Warnier, M. Oey, R. Timmer and F. Brazier, 2008. Enforcing security in the agentscape middleware. Proceedings of the Workshop on Middleware Security, December 2, 2008, Belgium, pp: 25-30.

Sandhu, R.S., E.J. Coyne, H.L. Feinstein and C.E. Youman, 1996. Role-based access control models. IEEE Comput., 29: 38-47.
Direct Link  |  

Su, C.J. and C.Y. Wu, 2011. JADE implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring. Applied Soft Comput., 11: 315-325.
CrossRef  |  

Telepovska, H., 2007. Agent system security. J. Inform. Control Manage. Syst., 5: 363-370.
Direct Link  |  

Van Noordende, G., F. Brazier, A.S. Tanenbaum and M. van Steen, 2001. Position summary: Mansion, a distributed multi-agent system. Proceedings of the 8th Workshop on Hot Topics in Operating Systems, December 2008, San Diego, CA., USA -.

Vieira-Marques, P.M., S. Robles, J. Cucurull, R.J. Cruz-Correia, G. Navarro and R. Marti, 2006. Secure integration of distributed medical data using mobile agents. IEEE Intell. Syst., 21: 47-54.
CrossRef  |  

Walsh, T., N. Paciorek and D. Wong, 1998. Security and reliability in ConcordiaTM. Proceedings of the 31st Hawaii International Conference on System Sciences, Volume 7, January 6-9, 1998, Kohala Coast, HI., pp: 44-53.

Wen, F., D. Guo and X. Li, 2014. Cryptanalysis of a new dynamic id-based user authentication scheme to resist smart-card-theft attack. Applied Math. Inform. Sci., 8: 1855-1858.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved