Secure multi-agent computations

被引:0
|
作者
Endsuleit, R [1 ]
Mie, T [1 ]
机构
[1] Univ Karlsruhe, Inst Algorithmen & Kognit Syst, Karlsruhe, Germany
关键词
distributed computations; security model; multi-agent systems;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a security model for open multi-agent systems. Given a user-defined task T, we generate a group of mobile agents which realise a common functionality that solves T. Those agents cooperate with each other and build an autonomous community. Using a scheme for secure distributed computations, this community is able to perform secure computations without requiring interaction with a trusted party. To get some formal security guarantees we incorporate Canetti's model for secure multi-party computations (see [6]) into the agent setting. Canetti's model assumes stationary parties and so does not cover the agents' migration process. But we will present a solution to this. Thus, we yield guarantees for code, data and execution integrity, data privacy and prevention from malicious routing.
引用
收藏
页码:149 / 155
页数:7
相关论文
共 50 条
  • [1] A formal model of multi-agent computations
    Smolka, Maciej
    [J]. PARALLEL PROCESSING AND APPLIED MATHEMATICS, 2008, 4967 : 351 - 360
  • [2] Improvement of a secure multi-agent marketplace
    Shi, Wenbo
    Yoo, Hyeong Seon
    [J]. RECENT PROGRESS IN COMPUTATIONAL SCIENCES AND ENGINEERING, VOLS 7A AND 7B, 2006, 7A-B : 495 - 498
  • [3] Secure Multi-Agent Planning Algorithms
    Stolba, Michal
    Tozicka, Jan
    Komenda, Antonin
    [J]. ECAI 2016: 22ND EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, 285 : 1714 - 1715
  • [4] Distributed Computations and Control in Multi-Agent Systems
    Rice, Justin K.
    Verhaegen, Michel
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON AUTONOMOUS ROBOTS AND AGENTS, 2009, : 81 - 86
  • [5] Secure Multi-agent Planning via Sharemind
    Bumbalek, Radek
    Stolba, Michal
    Komenda, Antonin
    [J]. ICAART: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2, 2020, : 852 - 859
  • [6] Multi-agent system for irregular parallel genetic computations
    Momot, J
    Kosacki, K
    Grochowski, M
    Uhruski, P
    Schaefer, R
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PT 3, PROCEEDINGS, 2004, 3038 : 623 - 630
  • [7] Towards adaptive and secure multi-agent systems
    Xiao, Liang
    Hu, Bo
    [J]. 2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 13 - 18
  • [8] Naval applications of secure multi-agent technology
    Bharadwaj, R
    [J]. FORMAL APPROACHES TO AGENT-BASED SYSTEMS, 2003, 2699 : 235 - 235
  • [9] Secure Multi-Agent System for Multi-Hop Environments
    Kraxberger, Stefan
    Danner, Peter
    Hein, Daniel
    [J]. COMPUTER NETWORK SECURITY, 2010, 6258 : 270 - 283
  • [10] An architectural description language for secure Multi-Agent Systems
    Mouratidis H.
    Kolp M.
    Giorgini P.
    Faulkner S.
    [J]. Web Intelligence and Agent Systems, 2010, 8 (01): : 99 - 122