Agentes

Páginas: 18 (4360 palabras) Publicado: 14 de mayo de 2012
Security Architecture for Agents Communication[1]


Abstract

In this paper we present a security architecture to enable the communication of distributed entities. This security architecture incorporates the innovative concept of automatic implementation of security protocols. The idea is based on the interpretation and implementation of formal specifications of security protocols. The modelhas been materialized in a platform that implements the security architecture designed. This platform is composed of an API (Application Programming Interface) developed in Java that is available for software developers, providing transparency for the implementation of those applications that demand security services (e-commerce, banking applications, Billing Systems, etc). The securityarchitecture proposed has been proven in the context of distributed applications, as well as in Multi-Agent systems. In the latter case, the security architecture provides a secure channel for the communication among agents by means of exchanges of KQML (Knowledge Query Management Language) messages [1].

Key words: Security Architecture, Security Protocols, Formal Specification, Multi-Agent Systems,KQML

1. Introduction

Formal Description Techniques are the base of the automated support in different development activities. The formal specification is an essential tool in the engineering of communications protocols. Using Formal Description Techniques significant improvements in the quality, availability in the market and cost of the lifecycle of the product can be obtained. The formalmodels of security have evolved in parallel with the development of the computer systems (software, hardware, operating systems), as well as with the technology and extension of the data networks. Initially, the formal models have dealt with the problem of control access in individual systems [2]END:Citation.Citation: END:Citation END:Citation

The important improvements of the Local Area Networks(LAN), and their interconnection with remote networks has given birth to new and more sophisticated threats associated with the distribution of the information (eavesdropping, tampering, impersonation, etc)Bibliographic Reference:END: Bibliographic Reference. This situation has led to the development of new security mechanisms and functions not only to solve the problems of access control toresources in individual systems but also to protect the information moving through open systems. In this case, the Formal Description Techniques (FDT) have been used to specify security protocols and to evaluate the vulnerability of these protocols against different attacks. Examples of this type of formal analysis are given inCitation: [3]END:Citation,Citation: [4]END:Citation.

FDT usually havetools associated with them that make the automatic implementation of communications protocols possible. The final tests should guarantee the adaptation of the code to the requirements of the specification. The application of FDT to the field of the security should contemplate the necessity to specify the exchanges that appropriately correspond to the security protocols, as well as the functions andmechanisms implied in order to be interpreted in the implementation phase.

The concept of automatic implementation of security protocols is based on the idea of offering security services in a dynamic way to distributed applications [5] (or agents). Thus it, the pair entities of our model incorporate a common code that interprets and implements automatically formal specifications of securityprotocols. A security service is associated with a formal specification of a protocol. An entity or agent according to their security policies can, in a given moment, implement a security protocol specified formally. However, the security policies can change. If this happens, the entities of our system can implement new formal specifications of protocols that offer new security services.

In the...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Agentes
  • Agentes
  • agentes
  • Agentes
  • Agenticidad
  • agente
  • Agente
  • Agentes

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS