scispace - formally typeset
Journal ArticleDOI

Adding security and trust to multiagent systems

H. Chi Wong, +1 more
- 01 Oct 2000 - 
- Vol. 14, Iss: 9, pp 927-941
Reads0
Chats0
TLDR
The design of a security infrastructure is presented applicable to MASs in general, and two types of trusts are addressed: trust that agents will not misbehave andtrust that agents are really delegatees of whom they claim to be.
Abstract
Multiagent systems (MASs) are societies whose individuals are software delegatees (agents) acting on behalf of their owners or delegators (people or organizations). When deployed in an open network such as the Internet, MASs face some trust and security issues. Agents comeand go, and interact with strangers. Assumptions about security and general trustworthiness of agents and their deployers are inadequate in this context. In this paper, the design of a security infrastructure is presented applicable to MASs in general. This design addresses both security threats and trust issues. In this design, there are mechanisms for ensuring secure communication among agents and secure naming and resource location services. And two types of trusts are addressed: trust that agents will not misbehave and trust that agents are really delegatees of whom they claim to be. To establish the first type of trust, deployers of agents are made liable for the actions of their agents; to establish the second type of trust, it is ...

read more

Citations
More filters
Journal ArticleDOI

On-line trust: concepts, evolving themes, a model

TL;DR: The definitions of trust are analyzed, the relevant dimensions of trust for an on-line context are identified, and a definition of trust between people and informational or transactional websites is presented.
Book ChapterDOI

Computational Intelligence: An Introduction

TL;DR: The general public becomes rapidly jaded with such ‘bold predictions’ that fail to live up to their original hype, and which ultimately render the zealots’ promises as counter-productive.
Journal ArticleDOI

A Survey on Trust Management for Mobile Ad Hoc Networks

TL;DR: This work seeks to combine the notions of "social trust" derived from social networks with "quality-of-service (QoS) trust"derived from information and communication networks to obtain a composite trust metric.
Journal ArticleDOI

The RETSINA MAS Infrastructure

TL;DR: This paper distill from the experience in developing MASs to clearly define a generic MAS infrastructure as the domain independent and reusable substratum that supports the agents' social interactions and shows that the MAS infrastructure imposes requirements on an individual agent.
Journal Article

Agent-Mediated Electronic Commerce

TL;DR: In this paper, the state of the art of agent-mediated electronic commerce (e-commerce), concentrating particularly on the business-to-consumer (B2C) and businessto-business (b2B) aspects, is surveyed and analyzed.
References
More filters

Internet X.509 Public Key Infrastructure Certificate and CRL Profile

TL;DR: In this article, the X.509 v3 certificate is described in detail, with additional information regarding the format and semantics of Internet name forms (e.g., IP addresses).
Journal ArticleDOI

Authentication in distributed systems: theory and practice

TL;DR: A theory of authentication and a system that implements it, based on the notion of principal and a “speaks for” relation between principals, is described and used to explain many existing and proposed security mechanisms.
Journal ArticleDOI

Distributed intelligent agents

TL;DR: In Retsina, the authors have developed a distributed collection of software agents that cooperate asynchronously to perform goal-directed information retrieval and integration for supporting a variety of decision-making tasks.
Proceedings ArticleDOI

Authentication in distributed systems: theory and practice

TL;DR: A theory of authentication and a system that implements it, based on the notion of principal and a "speaks for" relation between principals, that explains how to reason about a principal's authority by deducing the other principals it can speak for.
Related Papers (5)