Applying Formal Methods to Specify Security Requirements in Multi-Agent Systems

被引:6
|
作者
Subburaj, Vinitha Hannah [1 ]
Urban, Joseph E. [2 ]
机构
[1] West Texas A&M Univ Canyon, Sch Engn Comp Sci & Math, WTAMU Box 60767, Canyon, TX 79016 USA
[2] Arizona State Univ, Tempe, AZ 85281 USA
关键词
multi-agent systems; security requirements; formal methods; Descartes; -; Agent;
D O I
10.15439/2018F262
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security has become an important concern with the development of large scale distributed and heterogeneous multi-agent systems (MAS). One of the main problems in addressing security during the development of MAS is that security is often an afterthought. The cost involved to patch existing systems against vulnerabilities and attacks after deployment is high. If developers and designers can spend some quality time investigating security aspects before beginning to code then this cost can be reduced significantly. Also, using formal methods to specify the complex behavior of large scale software systems has resulted in reliable software systems. This research effort was focused on using formal methods early in the development lifecycle to specify security requirements for MAS. New solutions are emerging to fix security related issues, but how much thought gets in during the early phases of development in terms of security needs to be answered. In this paper, analysis of security requirements for MAS, existing solutions to secure MAS, and the use of formal methods to specify security requirements has been studied. Descartes - Agent, a formal specification language for specifying agent systems has been taken into study to model the security requirements of MAS early on in the development process. Functional specifications of MAS are modelled along with the non-functional security requirements using the Descartes - Agent specification language. A case study example is used to illustrate the specification of security requirements in MAS using the Descartes Agent.
引用
收藏
页码:707 / 714
页数:8
相关论文
共 50 条
  • [31] Applying the MVC design pattern to multi-agent systems
    Mahmoud, Qusay H.
    Maamar, Zakaria
    [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 1450 - +
  • [32] Experience using formal methods for specifying a multi-agent system
    Rouff, C
    Rash, J
    Hinchey, MG
    [J]. SIXTH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2000, : 72 - 80
  • [33] The Role of Requirements Engineering in the Development of Multi-Agent Systems
    Sampaio do Prado Leite, Julio Cesar
    [J]. JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2005, 5 (02): : 111 - 111
  • [34] Recommended Practices for the Specification of Multi-Agent Systems Requirements
    Slhoub, Khaled
    Carvalho, Marco
    Bond, Walter
    [J]. 2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 179 - 185
  • [35] Configuring requirements-compliant multi-agent systems
    Rho, S
    Rosset, S
    Redmond, T
    [J]. 2005 IEEE 2nd Symposium on Multi-Agent Security and Survivability, Proceedings, 2005, : 58 - 65
  • [36] Using Bounded Fairness to Specify and Verify Ordered Asynchronous Multi-agent Systems
    Li, Qin
    Smith, Graeme
    [J]. 2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 111 - 120
  • [37] FORMAL MODEL TO INTEGRATE MULTI-AGENT SYSTEMS AND INTERACTIVE GRAPHIC SYSTEMS
    Lopez-Gardia, Gabriel
    Molina-Carmona, Rafael
    Gallego-Sanchez, Javier
    [J]. ICAART 2010: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2: AGENTS, 2010, : 264 - 267
  • [38] Multi-Agent Systems for Scalable Internet of Things Security
    Kendrick, Phillip
    Hussain, Abir
    Criado, Natalia
    Randles, Martin
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [39] Specifying standard security mechanisms in multi-agent systems
    Poslad, S
    Charlton, P
    Calisti, M
    [J]. TRUST, REPUTATION, AND SECURITY: THEORIES AND PRACTICE, 2003, 2631 : 163 - 176
  • [40] A security infrastructure for trust management in multi-agent systems
    Poggi, A
    Tomaiuolo, M
    Vitaglione, G
    [J]. TRUSTING AGENTS FOR TRUSTING ELECTRONIC SOCIETIES: THEORY AND APPLICATIONS IN HCI AND E-COMMERCE, 2005, 3577 : 162 - 179