are more difficult to resolve because there is no
commonly accepted framework covering all the
aspects of a trust and security model. These threats,
along with the lack of a standardized way to address
them, are possible reasons for which MASs rely on
domains with central security administration for
their operation. In such environments the risks
concerning malicious entities are mitigated.
On the other hand, we have already stressed that
this kind of usage can be very restricting and hinders
the adoption of mobile agents, especially for large-
scale applications. It is true that, in order to operate
securely, an agent system requires a trusted
environment. This is achieved either by operating in
a completely closed environment, or by employing a
separate trust authority to guarantee the legitimacy
of the entities in a MAS.
Havana displays the interesting concept of
merging the trust-granting authority with the real-
world contracts. This combination ensures that in the
case of malicious behaviour there will be real-world
repercussions on the party behind the malicious
entity.
As a target of our future research, it would be
useful to take this concept outside the business scope
of Havana and create MAS-independent trust
granting authority, expanding the trust and security
models in the real world. Another interesting idea
for this trusted third party would be to offer non-
repudiation services in combination with insurance
services to registered members. The existence of this
service could help overcome the lack of trust in open
environment like the Internet, and could be
incorporated in a complete trust and security model
for the operation of mobile agents.
REFERENCES
Fragkakis, M., Alexandris, N., April 2007. Comparing the
Trust and Security Models of Four Mobile Agent
Platforms, RCIS’07 (a).
Fragkakis, M., Alexandris, N., 29 - 31 August 2007.
Comparing the Trust and Security Models of Mobile
Agents, IAS 07, Manchester, UK (b).
Ametller, J., Robles, S., Ortega-Ruiz, J. A., July 19-23, 04.
Self-Protected Mobile Agents, AAMAS'04, N. York.
Rempt, B., Mertz, D., July 2002. Distributing Computing -
Cooperative Computing with Mobile Agents Intel
Developer Services., Available:
http://gnosis.cx/publish/programming/dc4.pdf
Vlassis, N., 2007. A Concise Introduction to MAS and
Distributed AI, pp 1-6.
Poslad, S., Calisti, M., Charlton, P., 2002. Specifying
Standard Security Mechanisms in Multi-Agent
Systems”, AMAS 2002, Bologna, pages 122–127.
Zhang, M., Karmough, A., Impey, R., 2001. Adding
Security Features to FIPA Agent Platforms, Available:
www.elec.qmul.ac.uk/staffinfo/stefan/fipa-security/rfi-
responses/Karmouch-FIPA-Security-Journal.pdf.
English, C., Nixon, P., Terzis, S., McGettrick, A., Lowe,
H., 2002. Dynamic Trust Models for Ubiquitous
Computing Environments, UBICOMP `02.
Roth, V., July-2004. Obstacles to the adoption of mobile
agents, MDM’04.
Giang N.T., Tung, D.T., Jun 2002. Agent Platform
Evaluation and Comparison, II-SAS, Pellucid EU 5FP
IST-2001-34519 RTD.
Ferrari, L., Oct 2004. The Aglets 2.0.2 User’s Manual,
Available: http://aglets.sourceforge.net/.
Oshima, M., Karjoth, G., Ono K., 1998. Aglets
Specification 1.1 Draft, http://www.trl.ibm.com/aglets/
Fischmeister, S., Vigna, G., Kemmerer, R.A., Dec 2001.
Evaluating the Security Of Three Java-Based Mobile
Agent Systems, MA 2001, 31-41 LNCS 2240,
Springer.
Karjoth, G., Lange, D.B., Oshima, M., Jul/Aug 1997. A
security model for Aglets IBM Res. Div., Zurich, IEEE
Internet Computing, Vol 1, Issue: 4, pp 68-77.
Vigna, G., Cassell, B., Fayram, D., 2002. An Intrusion
Detection System for Aglets, I. Conference on Mobile
Agents.
Mahmoud, Q.H., Yu, L., 2005. An Architecture and
Business Model for Making Software Agents
Commercially Viable, HICSS 2005, Track 3, Vol 03.
Mahmoud, Q.H., Yu, L., May 2004. Havana: a mobile
agent platform for seamless integration with the
existing Web infrastructure, Canadian Conference on
Electrical and Computer Engineering, Vol 3, 2-5 pp
1257 – 1261.
Mahmoud, Q.H., Yu, L., 2006. Havana agents for
comparison shopping and location-aware advertising
in wireless mobile environments, ECRA 06, 5(3): 220-
228.
Kadhi, N., Burstein, E., Barika, F., Ghedira, K., March
2003. Towards Agent IDS: agent platform security
features study, Congreso de Seguridad
03.
Altmann, J., Gruber, F., Klug, L., Stockner, W., Weippl,
E., 2001. Using Mobile Agents in Real World: A
Survey and Evaluation of Agent Platforms, W. on
Infrastructure for Agents, MAS, and Scalable MAS at
Autonomous Agents `01.
Baumer, C., Breugst, M., Choy, S., Magedanz, T., October
1999. Grasshopper – A Universal Agent Platform
Based on OMG MASIF and FIPA Standards, Ottawa
MATA'99, World Scientific Publishing, , pp. 1-18.
Feiertag, R., Rho, J., Rosset, S., 2004. Engineering
Security in a Multi-Agent System, Cougaar Software.
Feiertag R., Rho, J., Rosset, S., 2004. Using Security
Mechanisms in Cougaar, Cougaar Software.
Cougaar version 11.4, 23 December 2004.
Rosset, S., 2004. Cougaar Security Services, Cougaar
Software.
ICSOFT 2008 - International Conference on Software and Data Technologies
180