Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Role-Based Access Control Models
Computer
Authentication, access control, and audit
ACM Computing Surveys (CSUR)
Communications of the ACM
REGRET: reputation in gregarious societies
Proceedings of the fifth international conference on Autonomous agents
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
A context-related authorization and access control method based on RBAC:
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Model-Carrying Code (MCC): a new paradigm for mobile-code security
Proceedings of the 2001 workshop on New security paradigms
Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence
Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence
Extracting reputation in multi agent systems by means of social network topology
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Reputation and social network analysis in multi-agent systems
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
A security architecture and design for mobile intelligent agent systems
ACM SIGAPP Applied Computing Review
A Roadmap of Agent Research and Development
Autonomous Agents and Multi-Agent Systems
Grasshopper - A Mobile Agent Platform for Active Telecommunication
IATA '99 Proceedings of the Third International Workshop on Intelligent Agents for Telecommunication Applications
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Calculus for Access Control in Distributed Systems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach
COORDINATION '00 Proceedings of the 4th International Conference on Coordination Languages and Models
Evaluating the Security of Three Java-Based Mobile Agent Systems
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Sliding Encryption: A Cryptographic Tool for Mobile Agents
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Authentication for Mobile Agents
Mobile Agents and Security
Safe, Untrusted Agents Using Proof-Carrying Code
Mobile Agents and Security
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
Mobile Agents: Are They a Good Idea?
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Is it an Agent, or Just a Program?: A Taxonomy for Autonomous Agents
ECAI '96 Proceedings of the Workshop on Intelligent Agents III, Agent Theories, Architectures, and Languages
ACM SIGOPS Operating Systems Review
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Modelling secure multiagent systems
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Belief, information acquisition, and trust in multi-agent systems: a modal logic formulation
Artificial Intelligence
Tropos: An Agent-Oriented Software Development Methodology
Autonomous Agents and Multi-Agent Systems
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
The Knowledge Engineering Review
Task delegation using experience-based multi-dimensional trust
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
An integrated trust and reputation model for open multi-agent systems
Autonomous Agents and Multi-Agent Systems
Certified reputation: how an agent can trust a stranger
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
A Dynamic Trust Model for the Multi-agent Systems
ISIP '08 Proceedings of the 2008 International Symposiums on Information Processing
Evaluating the security of mobile agent platforms
Autonomous Agents and Multi-Agent Systems
A security-aware metamodel for multi-agent systems (MAS)
Information and Software Technology
A personalized framework for trust assessment
Proceedings of the 2009 ACM symposium on Applied Computing
Trust representation and aggregation in a distributed agent system
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
Kerberos-Based Secure Multiagent Platform
Programming Multi-Agent Systems
Formal trust model for multiagent systems
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Safety and Security in Multiagent Systems
RBAC for Organisation and Security in an Agent Coordination Infrastructure
Electronic Notes in Theoretical Computer Science (ENTCS)
Specifying standard security mechanisms in multi-agent systems
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Communication security in multi-agent systems
CEEMAS'03 Proceedings of the 3rd Central and Eastern European conference on Multi-agent systems
LoT-RBAC: a location and time-based RBAC model
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
A security infrastructure for trust management in multi-agent systems
Trusting Agents for Trusting Electronic Societies
Permission and authorization in policies for virtual communities of agents
AP2PC'04 Proceedings of the Third international conference on Agents and Peer-to-Peer Computing
Developing and evaluating a generic metamodel for MAS work products
Software Engineering for Multi-Agent Systems IV
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
IEEE Communications Magazine
Countermeasures for mobile agent security
Computer Communications
A classification scheme for agent based approaches to dynamic optimization
Artificial Intelligence Review
Hi-index | 0.00 |
Multi-agent systems have attracted the attention of researchers because of agents' automatic, pro-active, and dynamic problem solving behaviors. Consequently, there has been a rapid development in agent technology which has enabled us to provide or receive useful and convenient services in a variety of areas such as banking, transportation, e-business, and healthcare. In many of these services, it is, however, necessary that security is guaranteed. Unless we guarantee the security services based on agent-based systems, these services will face significant deployment problems. In this paper, we survey existing work related to security in multi-agent systems, especially focused on access control and trust/reputation, and then present our analyses. We also present existing problems and discuss future research challenges.