Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Building a Distributed Secure System on Multi-Agent Platform Depending on the Principles of Software Engineering Life Cycle
Ghossoon Mohammed Waleed Al-Saadoon
Pages - 482 - 490 | Revised - 30-11-2010 | Published - 20-12-2010
MORE INFORMATION
KEYWORDS
Distributed Secure System , Platform, Multi Agent System, Access write, Lunix Read Hat , DM5.
ABSTRACT
Today, applications in mobile multi-agent systems require a high degree of confidence that running code inside the system will not be malicious. Also any malicious agents must be identified and contained. Since the inception of mobile agents, the intruder has been addressed using a multitude of techniques, but many of these implementations have only addressed concerns from the position of either the platform or the agents. Very few approaches have undertaken the problem of mobile agent security from both perspectives simultaneously. Furthermore, no middleware exists to facilitate provisioning of the required security qualities of mobile agent software while extensively focusing on easing the software development burden.
The aim is to build a distributed secure system using multi-agents by applying the principles of software engineering. The objectives of this paper is to introduce multi agent systems that enhance security rules through the access right to building a distributed secure system integrating with principles of software engineering system life cycle, as well as satisfy the security access right for both platform and agents to improve the three characteristics of agents adaptively, mobility and flexibility.
This project based on the platform of PHP and MYSQL (Database) which can be presented in a website. The implementation and test are applied in both Linux and Windows platforms, including Linux Red Hat 8, Linux Ubuntu 6.06 LTS and Microsoft Windows XP Professional. Since PHP and MySQL are available in almost all operating systems, the result could be tested the platform as long as PHP and MySQL configuration is available.
PHP5 and the MySQL (database) software are used to build a secure website. Multiple techniques of security and authentications have been used by multi-agents system. Secure database is encrypted by using md5. Also satisfy the characteristics for security requirements: confidentiality (protection from disclosure to unauthorized persons), integrity (maintaining data consistency) and authentication (assurance of identity of person or originator of data).
1 | Google Scholar |
2 | Academic Journals Database |
3 | CiteSeerX |
4 | refSeek |
5 | iSEEK |
6 | ResearchGATE |
7 | Libsearch |
8 | Bielefeld Academic Search Engine (BASE) |
9 | Scribd |
10 | SlideShare |
11 | PDFCAST |
12 | PdfSR |
. K. Rabuzin, M. Malekovic, Miroslav Baca (2006), “A SURVEY OF THE PROPERTIES OF AGENTS” .pdf, University of Zagreb, Faculty of Organization and Informatics, Varaždin | |
. Robert S. Gray, G. Cybenko, D. Kotz, Ronald A. Peterson and Daniela Rus ,“D’Agents: Applications and Performance of a Mobile-Agent System”, Thayer School of Engineering / Department of Computer Science,Dartmouth College,November 28, 2001. | |
A. Pridgen and C. Julien, A Secure Modular Mobile Agent System, The University of Texas at Austin, TR-UTEDGE-2006-003. | |
“An introduction to Agents, Todd Sundsted” , JavaWorld.com, 06/01/98, [online] available at:http://www.javaworld.com/javaworld/jw-06-1998/jw-06-howto.html | |
Dell’Acqua, P., M. Engberg, L.M. Pereira,” An Architecture for a Rational Reactive Agent”, [online] available at:http://centria.di.fct.unl.pt/~lmp/publications/online-papers/epia03- agent.pdf, 2003. | |
Geppert, A., M. Kradolfer, D.Tombros: “Realization of Cooperative Agents Using an Active Object-Oriented Database Management System”, Proc. 2nd Workshop on Rules in Databases (RIDS), Athens, Greece, 1995. | |
Hayes-Roth, B.” An architecture for adaptive intelligent systems, Artificial Intelligence Vol. 72, 1995 | |
M. Loulou, M. Jmaiel,A.Hadj Kacem and M.Mosbah, “A Conceptual Model for Secure Mobile Agent Systems”, computational intelligence and security, Proceedings of the 3rd international conference on , Nov 3-6/2006. [online] available at: http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4072023. | |
Marik, V., O. Stepankova, H. Krautwurmova, M. Luck.,” Multi agent systems and applications II”, Springer-Verlag Berlin Heidelberg, 2002. | |
Dr. Ghossoon Mohammed Waleed Al-Saadoon
Applied Science University (ASU) - Bahrain
ghowaleed2004@yahoo.com
|
|
|
|
View all special issues >> | |
|
|