A calculus of mobile processes, I
Information and Computation
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
DKAL: Distributed-Knowledge Authorization Language
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
Secure Interaction Models for the HealthAgents System
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
ICETET '08 Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology
Opacity generalised to transition systems
International Journal of Information Security
Specifying norm-governed computational societies
ACM Transactions on Computational Logic (TOCL)
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Models of Interaction as a Grounding for Peer to Peer Knowledge Sharing
Advances in Web Semantics I
Towards Information Flow Properties for Distributed Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Information Security Applications
Engineering open multi-agent systems as electronic institutions
AAAI'04 Proceedings of the 19th national conference on Artifical intelligence
A characterization of the problem of secure provenancemanagement
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
The OpenKnowledge system: an interaction-centered approach to knowledge sharing
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
Constructing secure mobile agent systems using the agent operating system
International Journal of Intelligent Information and Database Systems
Information Flow in Credential Systems
CSF '10 Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium
Intrusion detection of DoS/DDoS and probing attacks for web services
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
A lightweight coordination calculus for agent systems
DALT'04 Proceedings of the Second international conference on Declarative Agent Languages and Technologies
Hi-index | 0.00 |
In open multi-agent systems, electronic institutions are used to form the interaction environment by defining social norms for group behaviour. However, as this paper shows, electronic institutions can be turned against agents to breach their security in a variety of ways. We focus our attention on probing attacks using electronic institutions specified in the Lightweight Coordination Calculus (LCC) language. LCC is a choreography language used to define electronic institutions in agent systems. A probing attack is an attack against the confidentiality of information systems. In this paper, we redefine the probing attack in conventional network security to be applicable in a multi-agent system domain, governed by electronic institutions. We introduce different probing attacks against LCC interaction models and suggest a secrecy analysis framework for these interactions. The proposed framework could be used to detect the possibility of certain probing attacks and to identify some forms of malicious electronic institutions.