Citations


Contact Us

For Marketing, Sales and Subscriptions Inquiries
Rockefeller Center, 45 Rockefeller Plaza
20th Flr Unit #5, New York, NY 10111
United States

Conference List

Review of Computer Engineering Research

March 2018, Volume 5, 1, pp 1-11

A Security Scheme for Protecting Agent Societies

Antonio Munoz

Antonio Munoz 1

  1. Computer Science Department University of Malaga, Malaga, Spain 1

on Google Scholar
on PubMed

Pages: 1-11

DOI: 10.18488/journal.76.2018.51.1.11

Share :

Article History:

Received: 16 March, 2018
Revised: 16 April, 2018
Accepted: 20 April, 2018
Published: 23 April, 2018


Abstract:

Mobile agent paradigm, in particular multi-agent systems represent a promising technology for emerging Ambient Intelligent scenarios and Cyber Physical Systems sharing a huge number of heterogeneous devices interacting. Unfortunately, the lack of appropriate security mechanisms, both their enforcement and usability, is hindering the application of this paradigm in real world applications. This paper presents a software based solution for the protection of multi-agent systems based on mobility property of agents. This approach focuses on the cooperative agent-based model and the core of this concept is the protected computing approach. Finally, one aspect of this approach is its user friendly style for agent based system developers who are not security experts.
Contribution/ Originality
This study is one of very few studies which have investigated a mutual scheme mechanism for agent protection. This approach provides the theoretical foundations and a complete description of its implementation, which is supported with a set of tools to facilitate agent based system coding protection by a friendly graphical user interface.

Keywords:

Agent security, Protected computing, Trusted computing, Mobile agents, Multi-agent systems, BCEL, Mutual protection.

Reference:


Statistics:

Google Scholor ideas Microsoft Academic Search bing Google Scholor

Funding:

This study received no specific financial support.

Competing Interests:

The author declares that there are no conflicts of interests regarding the publication of this paper.

Acknowledgement:


Related Article

( 1 ) Security Issues with Contactless Bank Cards
( 2 ) Big Data in Homeland Security
( 3 ) Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
( 4 ) A Security Scheme for Protecting Agent Societies
( 5 ) Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective
( 6 ) Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
( 7 ) Cloud Security Vulnerabilities and Solution Model
( 8 ) Detection of Crossed Walls Security Alarm System against Invasion
( 9 ) An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks
( 11 ) Forecasting Air Passengers of Changi Airport Based on Seasonal Decomposition and an LSSVM Model
( 12 ) Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking
( 13 ) Feasibility of Chatbot for Mehran UET Examination Department
( 14 ) Information and Communication Technology (Ict) As a Necessity for Libraries and Librarians of Nigerian Universities in the 21st Century
( 15 ) A Study on Commensal Mortality Rate of a Typical Three Species Syn-Eco-System with Unlimited Resources for Commensal
( 16 ) Information and Communication Technology in Classroom Situations in Rural and Urban Areas in Zimbabwe: A Comparative Study on the Use of Digital and Projected Media in Teaching and Learning at Six Secondary Schools in Masvingo
( 17 ) Postbuckling Analysis of Functionally Graded Beams Using Hyperbolic Shear Deformation Theory
( 18 ) Classification and Identification of Risk Management Techniques for Mitigating Risks with Factor Analysis Technique in Software Risk Management
( 19 ) Information about Simulation Software for Testing of Wireless Network
( 20 ) Investigation on the Dependence of TCP Upstream Throughput on Snr for Single and Multiple Links in a Wlan System
( 21 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 22 ) Real-Time Workload Scheduling (RTWS) Algorithm for Cloud
( 23 ) Performance Analysis of Routing Protocols for CBR Traffic in Mobile Ad-Hoc Networks
( 24 ) Enhanced Isolation Mimo Antenna with DGS Structures for Long Term Evolution Systems
( 25 ) High Isolation Microstrip Mimo Antennas for Wlan Systems
( 26 ) Generalized Quantum Key Distribution for WDM Router Applications
( 27 ) Selection of Appropriate Equipment for Designing Effective Vacuum System
( 28 ) Web Service Composition for E-Commerce Web Application
( 29 ) Role of Library and Information Science Professionals in the Knowledge Society
( 30 ) A Comprehensive Review of Semiconductor-Type Gas Sensors for Environmental Monitoring
( 32 ) Path Loss Measurement and Modeling for Lagos State G.S.M Environments
( 33 ) Simulation of the Performance of CdTe/CdS/ZnO Multi- Junction Thin Film Solar Cell
( 34 ) Perturbation Functions for Compact Database
( 35 ) Chaotic Particle Swarm Optimization for Imprecise Combined Economic and Emission Dispatch Problem
( 36 ) Using ICT Policy Framework as a Panacea for Economic Recession and Instability in Nigeria
( 37 ) A Common Operational Picture in Support of Situational Awareness for Efficient Emergency Response Operations
( 38 ) Development Problems of Information Provision on the Management of High Technology Park
( 39 ) Comprehensive Analysis & Performance Comparison of Clustering Algorithms for Big Data
( 41 ) Creation of Algoritms for Recommendation System Based on Users Data on Internet Advertisement Marketing
( 42 ) Development and Performance Analysis of Bisection Method-Based Optimal Path Length Algorithm for Terrestrial Microwave Link
( 43 ) Development of Facilitated Participatory Spatial Information System for Selected Urban Management Services
( 44 ) Stanford University Interim Propagation Loss Model for a Gmelina Arborea Tree-Lined Road
( 45 ) Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
( 46 ) Development of Web Application for University of Uyo Post UTME Examination Timetable
( 47 ) A Framework for Digital Forensic in Joint Heterogeneous Cloud Computing Environment
( 48 ) A Structural Framework for Distributed Electronic Voters Register
( 49 ) A Review of Machine Learning Models for Software Cost Estimation
( 50 ) Speed Control of Induction Motor on C2000 DSP Platform
( 51 ) Application of Ant Algorithm for Software Optimization
( 52 ) Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders
( 53 ) Smart Feature Fusion and Model for Human Detection
( 54 ) LMS Algorithm for Adaptive Transversal Equalization of a Linear Dispersive Communication Channel
( 55 ) Study and Comparative Analysis of Programming Languages Used for Big Data
( 56 ) Activity Recognition and Creation of Web Service for Activity Recognition using Mobile Sensor Data using Azure Machine Learning Studio