Abstract
Security has become an important concern with the development of large scale distributed and heterogeneous multi-agent systems (MAS). One of the main problems in addressing security during the development of MAS is that security is often an afterthought. The cost involved to patch existing systems against vulnerabilities and attacks after deployment is high. If developers and designers can spend some quality time investigating security aspects before beginning to code then this cost can be reduced significantly. Also, using formal methods to specify the complex behavior of large scale software systems has resulted in reliable software systems. This research effort was focused on using formal methods early in the development lifecycle to specify security requirements for MAS. New solutions are emerging to fix security related issues, but how much thought gets in during the early phases of development in terms of security needs to be answered. In this paper, analysis of security requirements for MAS, existing solutions to secure MAS, and the use of formal methods to specify security requirements has been studied. Descartes-Agent, a formal specification language for specifying agent systems has been taken into study to model the security requirements of MAS early on in the development process. Functional specifications of MAS are modelled along with the non-functional security requirements using the Descartes-Agent specification language. This paper also describes the extensions made to the Agent Unified Modeling Language (AUML) to represent the security requirements of MAS. The extensions proposed to AUML are in accordance with the extensions made to the Descartes-Agent specification language. A case study example is used to illustrate the specification of security requirements in MAS using the Descartes-Agent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211–218 (2002). https://doi.org/10.1049/ecej:20020504
Borselius, N. Security in multi-agent systems. In: Proceedings of the 2002 International Conference on Security and Management (SAM’02), pp. 31–36 (2002)
Chong, S., et al.: Report on the NSF Workshop on Formal Methods for Security. arXiv preprint arXiv:1608.00678 (2016)
Wooldridge, M., Jennings, N.R. (eds.) Intelligent agents: Theories, Architectures and Languages, Lecture Notes in Artificial Intelligence, vol. 890 (1995), ISBN 3-540-58855-8. https://doi.org/10.1007/bfb0013568
Wing, J.M.: A symbiotic relationship between formal methods and security. In: Proceedings of Computer Security, Dependability and Assurance: From Needs to Solutions, pp. 26–38 (1998). https://doi.org/10.1109/csda.1998.798355
Bauer, B., Müller, J.P., Odell, J.: Agent UML: a formalism for specifying multiagent software systems. Int. J. Softw. Eng. Knowl. Eng. 11(03), 207–230 (2001). https://doi.org/10.1007/3-540-44564-1_6
FIPA Agent UML Web Site. http://www.fipa.org/activities/modeling.html
Huget, M.-P., Odell, J.: Representing agent interaction protocols with agent UML. In: Odell, J., Giorgini, P., Müller, Jörg P. (eds.) AOSE 2004. LNCS, vol. 3382, pp. 16–30. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30578-1_2
Jung, Y., Kim, M., Masoumzadeh, A., Joshi, J.B.: A survey of security issue in multi-agent systems. Artif. Intell. Rev. 37(3), 239–260 (2012). https://doi.org/10.1007/s10462-011-9228-8
Cavalcante, R.C., Bittencourt, I.I., da Silva, A.P., Silva, M., Costa, E., Santos, R.: A survey of security in multi-agent systems. Expert Syst. Appl. 39(5), 4835–4846 (2012). https://doi.org/10.1016/j.eswa.2011.09.130
Hedin, Y., Moradian, E.: Security in multi-agent systems. Procedia Comput. Sci. 60, 1604–1612 (2015). https://doi.org/10.1016/j.procs.2015.08.270
Jürjens, J.: UMLsec: extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45800-X_32
Mouratidis, H., Giorgini, P., Manson, G.: Modelling secure multiagent systems. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 859–866 (2003). https://doi.org/10.1145/860710.860713
Mouratidis, H., Giorgini, P.: Secure Tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(02), 285–309 (2007). https://doi.org/10.1142/s0218194007003240
Hussain, S., Dunne, P., Rasool, G.: Formal specification of security properties using Z notation. Res. J. Appl. Sci. Eng. Technol. 5(19), 4664–4670 (2013)
von Oheimb, D., Mödersheim, S.: ASLan++—a formal security specification language for distributed systems. In: Aichernig, Bernhard K., de Boer, Frank S., Bonsangue, Marcello M. (eds.) FMCO 2010. LNCS, vol. 6957, pp. 1–22. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25271-6_1
Hagalisletto, A.M., Haugsand, J.: A formal language for specifying security properties. In: Proceedings for the Workshop on Specification and Automated Processing of Security Requirements – SAPS 2004. Austrian Computer Society (2004)
Urban, J.E.: A specification language and its processor. Ph.D. dissertation. Computer Science Department. University of Southwestern Louisiana (1977)
Subburaj, V.H., Urban, J.E.: A formal specification language for modeling agent systems. In: 2013 Second International Conference on Informatics and Applications (ICIA), pp. 300–305. IEEE (2013). https://doi.org/10.1109/icoia.2013.6650273
Cernuzzi, L., Juan, T., Sterling, L., Zambonelli, F.: The Gaia methodology: basic concepts and extensions. Multiagent Syst. Artif. Soc. Simulated Organ. 11(2), 69–88 (2004). https://doi.org/10.1007/1-4020-8058-1_6
Żytniewski, M., Sołtysik, A., Sołtysik-Piorunkiewicz, A., Kopka, B.: Modelling of software agents in knowledge-based organisations. Analysis of proposed research tools. In: Ziemba, E. (ed.) Information Technology for Management. LNBIP, vol. 243, pp. 91–108. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30528-8_6
Etzioni, O., Weld, D.S.: Intelligent agents on the internet: fact, fiction, and forecast. IEEE Intell. Syst. 4, 44–49 (1995). https://doi.org/10.1109/64.403956
Franklin, S., Graesser, A.: Is it an agent, or just a program?: A taxonomy for autonomous agents. In: Müller, J.P., Wooldridge, M.J., Jennings, N.R. (eds.) ATAL 1996. LNCS, vol. 1193, pp. 21–35. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0013570
Subburaj, V.H., Urban, J.: Intelligent agent software development using AUML and the Descartes specification language. In 2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, pp. 297–305 (2011). https://doi.org/10.1109/isorcw.2011.43
Kahloul, L., Barkaoui, K., Sahnoun, Z.: Using AUML to derive formal modeling agents interactions. In: The 3rd ACS/IEEE International Conference on Computer Systems and Applications, p. 109. IEEE (2005). https://doi.org/10.1109/aiccsa.2005.1387098
DiPippo, L.C., Fay-Wolfe, V., Nair, L., Hodys, E., Uvarov, O.: A real-time multi-agent system architecture for e-commerce applications. In: Proceedings of the 5th International Symposium Autonomous Decentralized Systems, pp. 357–364. IEEE (2001). https://doi.org/10.21236/ada477877
Subburaj, V.H., Urban, J.E.: Formal specification language and agent applications. In: Kołodziej, J., Correia, L., Molina, J.M. (eds.) Intelligent Agents in Data-intensive Computing. SBD, vol. 14, pp. 99–122. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-23742-8_5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Subburaj, V.H., Urban, J.E. (2019). Specifying Security Requirements in Multi-agent Systems Using the Descartes-Agent Specification Language and AUML. In: Ziemba, E. (eds) Information Technology for Management: Emerging Research and Applications. AITM ISM 2018 2018. Lecture Notes in Business Information Processing, vol 346. Springer, Cham. https://doi.org/10.1007/978-3-030-15154-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-15154-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15153-9
Online ISBN: 978-3-030-15154-6
eBook Packages: Computer ScienceComputer Science (R0)