TY - GEN
T1 - Design and implementation of security mechanisms for a hierarchical community-based multi-agent system
AU - Takahashi, Kenichi
AU - Mitsuyuki, Yoshiki
AU - Mine, Tsunenori
AU - Sakurai, Kouichi
AU - Amamiya, Makoto
PY - 2009/7/17
Y1 - 2009/7/17
N2 - Recently, several community-based systems have been developed; however, almost all such systems have been developed as Webserver- based systems. Thus, server administrator can easily eavesdrop on user communications, since they have to send/receive information through the server. Therefore, we propose multi-agent-based peer-topeer (P2P) system wherein each peer manages his/her information and exchanges it with other peers directly. This, thus, resolves the problems posed byWeb-server-based systems; however, we have to consider attacks from malicious third parties. This study designs and implements security protocols/mechanisms for a hierarchical community-based multi-agent system. Furthermore, if we consider a practical use case, we should be able to demonstrate that the proposed system can be implemented by combining it with existing security techniques for more reliable and rapid deployment. Finally, we evaluate the performance of the proposed security system and present an example application.
AB - Recently, several community-based systems have been developed; however, almost all such systems have been developed as Webserver- based systems. Thus, server administrator can easily eavesdrop on user communications, since they have to send/receive information through the server. Therefore, we propose multi-agent-based peer-topeer (P2P) system wherein each peer manages his/her information and exchanges it with other peers directly. This, thus, resolves the problems posed byWeb-server-based systems; however, we have to consider attacks from malicious third parties. This study designs and implements security protocols/mechanisms for a hierarchical community-based multi-agent system. Furthermore, if we consider a practical use case, we should be able to demonstrate that the proposed system can be implemented by combining it with existing security techniques for more reliable and rapid deployment. Finally, we evaluate the performance of the proposed security system and present an example application.
UR - http://www.scopus.com/inward/record.url?scp=67650283898&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=67650283898&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-01639-4_12
DO - 10.1007/978-3-642-01639-4_12
M3 - Conference contribution
AN - SCOPUS:67650283898
SN - 3642016383
SN - 9783642016387
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 134
EP - 145
BT - Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers
T2 - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007
Y2 - 21 November 2007 through 23 November 2007
ER -