able assets such as the “Building-State Artifact”.
The distributed deployment configuration seems
indeed more expensive from the protection mecha-
nisms viewpoint, since all the system entities and the
communication channels need to be protected.
However, this configuration makes it possible to
decouple the exposures level of assets, choosing the
most suitable protection mechanism for each: this
is why the exposure levels for this configuration are
the same as in Figure 2. In addition, this deploy-
ment could lead to reduce the inter-dependency be-
tween threat probabilities: for instance, if the ar-
tifact controls the identity of the requesting agent
and adopts secure channels and cryptographic algo-
rithms, the threats to agents are decoupled from the
threats to artifact and vice versa. Of course, this con-
figuration presents higher probability values associ-
ated with intra-MAS communication than in the cen-
tralised scenario, since the communications between
entities always occur between network nodes, expos-
ing the vulnerabilities related to the interactions.
As a result, the distributed configuration seems
more appealing than the centralised one, the key deci-
sion element being the former’s resiliency: the com-
promission of one node does not automatically im-
plies the compromission of the whole system.
Once a “deployment architecture” is chosen for
the base scenario, it also influences the way risk
analysis is updated when the scenario changes. So,
the choice of a deployment configuration should be
guided by the findings of an accurate risk analysis, but
it also affects the way the risk analysis itself evolves
with the system.
5 CONCLUSIONS
In this paper we explored the topic of security assess-
ment in a MAS, taking a MAS-based access control
system as our reference. We performed a detailed risk
analysis then, we studied how the deployment choices
can influence the opportunity for attacks and the ef-
fects of their success. From the viewpoint of the soft-
ware development lifecycle, the deployment analysis
we performed can be situated at the end of the design
phase as the purpose of this study is precisely to iden-
tify the “most adequate” deployment strategy in terms
of security assessment.
Of course, our work is just the starting point of
the story. Much broader research is needed to de-
vise a general model of the security requirements for
MAS-based systems: in turn, this will open the way
towards the integration of security aspects into a suit-
able agent-oriented design methodology. Further in-
vestigations are also required concerning the security
issues at the infrastructural level, since the role of the
MAS infrastructures is becoming more and more rel-
evant in the whole MAS development process.
REFERENCES
Bordini, R., Braubach, L., et al. (2006). A survey of pro-
gramming languages and platforms for multi-agent
systems. Informatica, 30:33–44.
Bresciani, P., Perini, A., et al. (2004). Tropos: An agent-
oriented software development methodology. AAMAS
Journal, 8(3):203–236.
JADE (2005). Jade.tilab.com/doc/tutorials/JADE Security.pdf.
Liu, L., Yu, E., and Mylopoulos, J. (2002). Analyzing se-
curity requirements as relationships among strategic
actors. Raleigh, North Carolina. electronic note.
Lodderstedt, T., Basin, D. A., et al. (2002). SecureUML: A
UML-based modeling language for model-driven se-
curity. In Proc. 5th Int. Conf. on The Unified Modeling
Language, pages 426–441, London, UK. Springer.
Molesini, A., Denti, E., and Omicini, A. (2009). RBAC-
MAS & SODA: Experimenting RBAC in AOSE. In
Engineering Societies in the Agents World IX, volume
5485 of LNCS. Springer.
Mouratidis, H. and Giorgini, P. (2007). Secure tropos: A
security-oriented extension of the tropos methodol-
ogy. International Journal of Software Engineering
and Knowledge Engineering, 17(2):285–309.
Omicini, A., Ricci, A., and Viroli, M. (2006). Agens Faber:
Toward a theory of artefacts for MAS. ENTCSs,
150(3):21–36.
RBAC (2004). http://csrc.nist.gov/rbac/.
Samarati, P. and Capitani de Vimercati, S. (2001). Access
control: Policies, models, and mechanisms. In Foun-
dations of Security Analysis and Design, volume 2171
of LNCS, pages 137–196. Springer.
Sommerville, I. (2007). Software Engineering 8th Edition.
Addison-Wesley.
Viroli, M., Omicini, A., and Ricci, A. (2007). Infrastructure
for RBAC-MAS: An approach based on Agent Co-
ordination Contexts. Applied Artificial Intelligence,
21(4–5):443–467.
Yamazaki, W., Hiraishi, H., and Mizoguchi, F. (2004). De-
signing an agent-based rbac system for dynamic secu-
rity policy. In Proc. 13th IEEE Int. Workshops on En-
abling Technologies (WETICE’04), pages 199–204,
Washington, DC, USA. IEEE CS.
ICAART 2010 - 2nd International Conference on Agents and Artificial Intelligence
148