{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T05:56:42Z","timestamp":1717739802507},"reference-count":92,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,5,16]],"date-time":"2012-05-16T00:00:00Z","timestamp":1337126400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10462-012-9343-1","type":"journal-article","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T16:54:02Z","timestamp":1337100842000},"page":"607-636","source":"Crossref","is-referenced-by-count":46,"title":["A review of attacks and security approaches in open multi-agent systems"],"prefix":"10.1007","volume":"42","author":[{"given":"Shahriar","family":"Bijani","sequence":"first","affiliation":[]},{"given":"David","family":"Robertson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,16]]},"reference":[{"key":"9343_CR1","unstructured":"Aggarwal CC, Yu PS (2008) Outlier detection with uncertain data. In: SIAM international conference on data mining (SDM), pp 483\u2013493"},{"key":"9343_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1459010.1459011","volume":"10","author":"A Artikis","year":"2009","unstructured":"Artikis A, Sergot M, Pitt J (2009) Specifying norm-governed computational societies. ACM Trans Comput Logic 10: 1\u201342","journal-title":"ACM Trans Comput Logic"},{"key":"9343_CR3","first-page":"171","volume":"0","author":"MY Becker","year":"2010","unstructured":"Becker MY (2010) Information flow in credential systems. IEEE Comput Secur Found Symp 0: 171\u2013185","journal-title":"IEEE Comput Secur Found Symp"},{"issue":"5","key":"9343_CR4","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1016\/j.infsof.2008.05.003","volume":"51","author":"G Beydoun","year":"2009","unstructured":"Beydoun G, Low G, Mouratidis H, Henderson-Sellers B (2009) A security-aware metamodel for multi-agent systems (MAS). Inf Softw Technol 51(5): 832\u2013845","journal-title":"Inf Softw Technol"},{"key":"9343_CR5","unstructured":"Bierman E, Cloete E (2002) Classification of malicious host threats in mobile agent computing. In: SAICSIT\u201902: Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on enablement through technology. South African Institute for Computer Scientists and Information Technologists, South Africa, pp 141\u2013148"},{"key":"9343_CR6","unstructured":"Bijani S, Robertson D, Aspinall D (2011) Probing attacks on multi-agent systems using electronic institutions. In: Declarative Agent Languages and Technologies Workshop (DALT), AAMAS 2011"},{"key":"9343_CR7","unstructured":"Borselius N, Mitchell C (2003) Securing FIPA agent communication. In: Proceedings of the 2003 International conference on security and management (SAM\u201903), vol 1, USA, pp 135\u2013141"},{"key":"9343_CR8","doi-asserted-by":"crossref","unstructured":"Botelho V, Enembreck F, Avila B, de Azevedo H, Scalabrin E (2009) Encrypted certified trust in multi-agent system. In: The 13th international conference on computer supported cooperative work in design, pp 227\u2013232","DOI":"10.1109\/CSCWD.2009.4968063"},{"key":"9343_CR9","doi-asserted-by":"crossref","unstructured":"Braynov S, Jadliwala M (2004) Detecting malicious groups of agents. In: Proceedings of the 1st IEEE symposium on multi-agent security and survivability (MAS&S) 2004. IEEE Computer Society, Philadelphia, pp 90\u201399","DOI":"10.1109\/MASSUR.2004.1368422"},{"key":"9343_CR10","doi-asserted-by":"crossref","unstructured":"Bresciani P, Giorgini P, Manson G, Mouratidis H (2004a) Multi-agent systems and security requirements analysis. In: Lecture Notes in Computer Science. Springer, Berlin","DOI":"10.1007\/978-3-540-24625-1_3"},{"key":"9343_CR11","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P Bresciani","year":"2004","unstructured":"Bresciani P, Perini A, Giorgini P, Giunchiglia F, Mylopoulos J (2004b) TROPOS: an agent-oriented software development methodology. Auton Agents Multi Agent Syst 8: 203\u2013236","journal-title":"Auton Agents Multi Agent Syst"},{"issue":"1","key":"9343_CR12","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MIC.2006.5","volume":"10","author":"G Carl","year":"2006","unstructured":"Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack- detection techniques. IEEE Internet Comput 10(1): 82\u201389","journal-title":"IEEE Internet Comput"},{"key":"9343_CR13","doi-asserted-by":"crossref","first-page":"15:1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41: 15:1\u201315:58","journal-title":"ACM Comput Surv"},{"key":"9343_CR14","doi-asserted-by":"crossref","unstructured":"Cheng A, Friedman E (2005) Sybilproof reputation mechanisms. In: P2PECON\u201905: Proceedings of the 2005 ACM SIGCOMM workshop on economics of peer-to-peer systems. ACM, Philadelphia, pp 128\u2013132","DOI":"10.1145\/1080192.1080202"},{"key":"9343_CR15","doi-asserted-by":"crossref","unstructured":"Clark KP, Warnier M, Quillinan TB, Brazier FM (2010) Secure monitoring of service level agreements. In: Proceedings of the 2nd international workshop on organizational security aspects (OSA 2010). IEEE","DOI":"10.1109\/ARES.2010.33"},{"key":"9343_CR16","doi-asserted-by":"crossref","unstructured":"Dasgupta D, Majumdar N (2002) Anomaly detection in multidimensional data using negative selection algorithm. In: The IEEE conference on evolutionary computation. Hawaii, pp 1039\u20131044","DOI":"10.1109\/CEC.2002.1004386"},{"key":"9343_CR17","unstructured":"Demazeau Y, Rocha Costa A. (1996) Populations and organizations in open multi-agent systems. In: Proceedings of the I national symposium on parallel and distributed AI (PDAI\u201996), Hyderabad"},{"key":"9343_CR18","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19-5","author":"DE Denning","year":"1976","unstructured":"Denning DE (1976) A lattice model of secure information flow. Commun. ACM 19-5: 236\u2013243","journal-title":"Commun. ACM"},{"key":"9343_CR19","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The sybil attack. In: IPTPS \u201901: Revised papers from the 1st international workshop on peer-to-peer systems. Springer, pp 251\u2013260","DOI":"10.1007\/3-540-45748-8_24"},{"key":"9343_CR20","unstructured":"Dove R (2009) On detecting and classifying aberrant behavior in unmanned autonomous systems under test and on mission. In: Live virtual constructive conference. International Test and Evaluation Association"},{"key":"9343_CR21","doi-asserted-by":"crossref","unstructured":"El Ariss O, Xu D (2011) Modeling security attacks with statecharts. In: The joint ACM SIGSOFT conference\u2014QoSA and ACM SIGSOFT symposium. ACM, pp 123\u2013132","DOI":"10.1145\/2000259.2000281"},{"key":"9343_CR22","unstructured":"Ellison C, Schneier B (2000) Ten risks of PKI: what you\u2019re not being told about public key infrastructure. Comput Secur J 16(2):1\u20137"},{"key":"9343_CR23","unstructured":"Endsuleit R, Wagner A (2004) Possible attacks on and countermeasures for secure multi-agent computation. In: Proceedings of the international conference on security and management (SAM\u201904), Las Vegas, pp 221\u2013227"},{"key":"9343_CR24","unstructured":"Esteva M, de la Cruz D, Rosell B, Arcos JL, Rodriguez-Aguilar JA, Cuni G (2004) Engineering open multi-agent systems as electronic institutions. In: 19th national conference on artifical Intelligence (AAAI 04). AAAI Press, pp 1010\u20131011"},{"key":"9343_CR25","unstructured":"Finin T, Joshi A, Joshi A (2002) Developing secure agent systems using delegation based trust management. In: Security of mobile multiAgent systems (SEMAS 02) held at autonomous agents and multiAgent systems (AAMAS), pp 200\u2013202"},{"key":"9343_CR26","unstructured":"Foner LN (1996) A security architecture for multi-agent matchmaking. In: Proceedings of the 2nd international conference on multi-agent systems, pp 80\u201386"},{"key":"9343_CR27","doi-asserted-by":"crossref","first-page":"5:1","DOI":"10.1145\/1410234.1410239","volume":"12","author":"JY Halpern","year":"2008","unstructured":"Halpern JY, ONeill KR (2008) Secrecy in multiagent systems. ACM Trans Inf Syst Secur 12: 5:1\u20135:47","journal-title":"ACM Trans Inf Syst Secur"},{"key":"9343_CR28","doi-asserted-by":"crossref","unstructured":"He Q, Sycara KP, Finin TW (1998) Personal security agent: KQML-based PKI. In: The 2nd international conference on autonomous agents","DOI":"10.1145\/280765.280865"},{"issue":"1","key":"9343_CR29","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/COMST.2008.4483667","volume":"10","author":"V Igure","year":"2008","unstructured":"Igure V, Williams R (2008) Taxonomies of attacks and vulnerabilities in computer systems. Commun Surv Tutor 10(1): 6\u201319","journal-title":"Commun Surv Tutor"},{"key":"9343_CR30","unstructured":"Jansen W, Karygiannis T (2000) Mobile agent security. National Institute of Standards and Technology (NIST) Special Publication 800-19"},{"key":"9343_CR31","doi-asserted-by":"crossref","unstructured":"Jurjens J (2002) Using UMLsec and goal trees for secure systems development. In: The 2002 ACM symposium on applied computing. ACM, Madrid, pp 1026\u20131030","DOI":"10.1145\/508791.508990"},{"key":"9343_CR32","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1273\/cbij.3.30","volume":"3","author":"K Kadota","year":"2003","unstructured":"Kadota K, Tominaga D, Akiyama Y, Takahashi K (2003) Detecting outlying samples in microarray data: a critical assessment of the effect of outliers on sample classification. Chem-Bio Inform 3: 30\u201345","journal-title":"Chem-Bio Inform"},{"key":"9343_CR33","doi-asserted-by":"crossref","unstructured":"Karnik NM, Tripathi AR (2001) Security in the Ajanta mobile agent system. Softw Pract Experience 31(4):301\u2013329","DOI":"10.1002\/spe.364"},{"key":"9343_CR34","doi-asserted-by":"crossref","unstructured":"Khan A, Arshad Q, Niu X, Yong Z, Anwar MW (2009) On the security properties and attacks against mobile agent graph head sealing (MAGHS). In: The 3rd international conference and workshops on advances in information security and assurance (ISA 09). Springer, Seoul, pp 223\u2013228","DOI":"10.1007\/978-3-642-02617-1_23"},{"key":"9343_CR35","unstructured":"Lee H, Alves-Foss J, Harrison S (2004) The use of encrypted functions for mobile agent security. In: The 37th annual Hawaii international conference on system sciences (HICSS\u201904). IEEE Computer Society, p 10"},{"key":"9343_CR36","doi-asserted-by":"crossref","DOI":"10.21236\/ADA431826","volume-title":"An annotated review of past papers on attack graphs","author":"RP Lippmann","year":"2005","unstructured":"Lippmann RP, Ingols KW (2005) An annotated review of past papers on attack graphs. Linoln Lab, MIT, Cambridge"},{"key":"9343_CR37","unstructured":"Liu L, Yu E, Mylopoulos J (2002) Analyzing security requirements as relationships among strategic actors. In: 2nd Symposium on requirements engineering for information security (SREIS 2002)"},{"key":"9343_CR38","doi-asserted-by":"crossref","unstructured":"Loulou M, Tounsi M, Kacem AH, Jmaiel M, Mosbah M (2007) A formal approach to prevent attacks on mobile agent systems. In: SECUREWARE\u201907: Proceedings of the the international conference on emerging security information, systems, and technologies. IEEE Computer Society, Washington, pp 42\u201347","DOI":"10.1109\/SECUREWARE.2007.4385308"},{"key":"9343_CR39","doi-asserted-by":"crossref","unstructured":"Majumdar A, Thomborson C (2005) On the use of opaque predicates in mobile agent code obfuscation. In: Intelligence and security informatics. Springer, Berlin, pp 255\u2013236","DOI":"10.1007\/11427995_90"},{"key":"9343_CR40","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-642-05183-8_6","volume":"265","author":"F Massacci","year":"2010","unstructured":"Massacci F, Mylopoulos J, Zannone N (2010) Security requirements engineering: the SI* modeling language and the secure tropos methodology. Adv Intell Inf Syst 265: 147\u2013174","journal-title":"Adv Intell Inf Syst"},{"key":"9343_CR41","doi-asserted-by":"crossref","unstructured":"McDermott JP (2000) Attack net penetration testing. In: The 2000 workshop on new security paradigms (NSPW\u201900), Cork, pp 15\u201321","DOI":"10.1145\/366173.366183"},{"key":"9343_CR42","unstructured":"Microsoft (2010) Threat risk modeling. Retrieved from The Open Web Application Security Project: http:\/\/www.owasp.org\/index.php\/Threat_Risk_Modeling"},{"key":"9343_CR43","volume-title":"Security for Mobility","author":"C Mitchell","year":"2003","unstructured":"Mitchell C (2003) Security for Mobility. Institution of Electrical Engineers, Piscataway"},{"issue":"2","key":"9343_CR44","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis H (2007) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng (IJSEKE) 17(2): 285\u2013309","journal-title":"Int J Softw Eng Knowl Eng (IJSEKE)"},{"key":"9343_CR45","doi-asserted-by":"crossref","unstructured":"Mouratidis H, Giorgini P (2009) Enhancing secure tropos to effectively deal with security requirements in the development of multiagent systems In: Safety and security in multiagent systems. Springer-Verlag, pp 8\u201326","DOI":"10.1007\/978-3-642-04879-1_2"},{"key":"9343_CR46","doi-asserted-by":"crossref","unstructured":"Mouratidis H, Giorgini P, Manson G (2003a) Modelling secure multiagent systems. In: AAMAS 03: Proceedings of the 2nd international joint conference on autonomous agents and multiagent systems. ACM, New York, pp 859\u2013866","DOI":"10.1145\/860575.860713"},{"key":"9343_CR47","unstructured":"Mouratidis H, Giorgini P, Weiss M (2003b) Integrating patterns and agent-oriented methodologies to provide better solutions for the development of secure agent systems. In: Workshop on expressiveness of pattern languages 2003, at ChiliPLoP"},{"key":"9343_CR48","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-68671-1_5","volume-title":"Mobile agents and security","author":"G Necula","year":"1998","unstructured":"Necula G, Lee P (1998) Safe, untrusted agents using proof-carrying code. In: Vigna G (eds) Mobile agents and security. Springer, Berlin, pp 61\u201391"},{"key":"9343_CR49","doi-asserted-by":"crossref","unstructured":"Novak P, Rollo M, Hodik J, Vlcek T (2003) Communication security in multi-agent systems. In: The 3rd central and eastern European conference on multi-agent systems (CEEMAS\u201903). Springer, pp 454\u2013463","DOI":"10.1007\/3-540-45023-8_44"},{"key":"9343_CR50","unstructured":"Odubiyi JB, Choudhary AR (2007) Building security into an IEEE FIPA compliant multiagent system. In: Proceedings of the 2007 IEEE workshop on information assurance, IAW. IEEE Computer Society, West Point, pp 49\u201355"},{"key":"9343_CR51","doi-asserted-by":"crossref","unstructured":"Oey MA, Warnier M, Brazier FM (2010) Security in large-scale open distributed multi-agent systems. In: Kordic V (ed) Autonomous agents. IN-TECH, pp 107\u2013130","DOI":"10.5772\/9656"},{"key":"9343_CR52","unstructured":"Page JP, Zaslavsky AB, Indrawan MT (2005) Extending the buddy model to secure variable sized multi agent communities. In: Proceedings of the 2nd international workshop on safety and security in multiagent systems, Utrecht, pp 59\u201375"},{"key":"9343_CR53","unstructured":"Park H, Ju H, Chun K, Lee J, Ahn S, Noh B (2006) The algorithm to enhance the security of multi-agent in distributed computing environment. In: ICPADS\u201906: Proceedings of the 12th international conference on parallel and distributed systems. IEEE Computer Society, Washington, pp 55\u201360"},{"key":"9343_CR54","doi-asserted-by":"crossref","unstructured":"Paruchuri P, Tambe M, Ordonez F, Kraus S (2006) Security in multiagent systems by policy randomization. In: Proceedings of the 5th international joint conference on autonomous agents and multiagent systems (AAMAS 06). ACM, Hakodate, pp 273\u2013280","DOI":"10.1145\/1160633.1160681"},{"key":"9343_CR55","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s10799-008-0047-9","volume":"10","author":"P Paruchuri","year":"2009","unstructured":"Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2009) Coordinating randomized policies for increasing security of agent systems. Inf Technol Manag 10: 67\u201379","journal-title":"Inf Technol Manag"},{"key":"9343_CR56","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MIC.2003.1215662","volume":"7","author":"C Petrie","year":"2003","unstructured":"Petrie C, Bussler C (2003) Service agents and virtual enterprises: a survey. IEEE Internet Comput 7: 68\u201378","journal-title":"IEEE Internet Comput"},{"key":"9343_CR57","unstructured":"Poslad S, Calisti M (2000) Towards improved trust and security in FIPA agent platforms. In: Workshop on deception, fraud and trust in agent Societies, Spain"},{"key":"9343_CR58","unstructured":"Poslad S, Charlton P, Calisti M (2002) Specifying standard security mechanisms in Multi-agent systems. In: Trust, reputation, and security: theories and Practice, AAMAS 2002 international workshop. Springer, Berlin, pp 122\u2013127"},{"key":"9343_CR59","doi-asserted-by":"crossref","unstructured":"Quillinan TB, Warnier M, Oey MA, Timmer RJ, Brazier FM (2008) Enforcing security in the agentScape middleware. In: Proceedings of the 1st international workshop on middleware security (MidSec). ACM","DOI":"10.1145\/1463342.1463347"},{"key":"9343_CR60","unstructured":"Ray M (2009) Authentication gap in TLS renegotiation. http:\/\/extendedsubset.com\/?p=8"},{"key":"9343_CR61","doi-asserted-by":"crossref","unstructured":"Rescorla E, Ray M, Dispensa S, Oskov N (2010, Feb) Transport layer security (TLS) renegotiation indication extension. Internet Engineering Task Force (IETF)","DOI":"10.17487\/rfc5746"},{"key":"9343_CR62","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-68671-1_2","volume-title":"Environmental key generation towards clueless agents. Mobile agents and security","author":"J Riordan","year":"1998","unstructured":"Riordan J, Schneier B (1998) Environmental key generation towards clueless agents. Mobile agents and security. Springer, Berlin, pp 15\u201324"},{"key":"9343_CR63","doi-asserted-by":"crossref","unstructured":"Robertson D (2005) A lightweight coordination calculus for agent systems. In: Declarative agent languages and technologies II, vol 3476\/2005. Springer, Berlin, pp 183\u2013197","DOI":"10.1007\/11493402_11"},{"key":"9343_CR64","unstructured":"Robertson D, Giunchiglia F, Harmelen Fv, Marchese M, Sabou M, Schorlemmer M et\u00a0al (2008) Open knowledge\u2014coordinating knowledge sharing through peer-to-peer interaction. In: Languages, methodologies and development tools for multi-agent systems. 1st International workshop, LADS 2007. Revised Selected and Invited Papers, vol 5118, pp 1\u201318"},{"key":"9343_CR65","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-7643-8543-9_4","volume-title":"Issues in multi-agent systems: the agentCities. ES experience (Vol. Chapter 4)","author":"S Robles","year":"2008","unstructured":"Robles S (2008) Trust and security. In: Moreno A., Pavn J. (eds) Issues in multi-agent systems: the agentCities. ES experience (Vol. Chapter 4). Birkh\u00e4user, Basel, pp 87\u2013115"},{"key":"9343_CR66","doi-asserted-by":"crossref","first-page":"23","DOI":"10.4018\/jsse.2011070102","volume":"2","author":"DM Rojas","year":"2011","unstructured":"Rojas DM, Mahdy AM (2011) Integrating threat modeling in secure agent-oriented software development. Int J Softw Eng (IJSE) 2: 23\u201336","journal-title":"Int J Softw Eng (IJSE)"},{"issue":"1","key":"9343_CR67","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld A, Myers A (2003) Language-based information-flow security. IEEE J Sel Areas Commun 21(1): 5\u201319","journal-title":"IEEE J Sel Areas Commun"},{"key":"9343_CR68","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier B (1999) Attack trees. Dr. Dobb\u2019s J Softw Tools 24: 21\u201329","journal-title":"Dr. Dobb\u2019s J Softw Tools"},{"key":"9343_CR69","unstructured":"Sierra C, Walton C, Robertson D, Gerloff EJ, Li JS, Abian J et\u00a0al (2008) Report on bioinformatics case studies. Techreport"},{"key":"9343_CR70","doi-asserted-by":"crossref","unstructured":"Silei L, Rui Z, Jun L, Junmo X (2008) A novel security protocol to protect mobile agent against colluded truncation attack by cooperation. In: International conference on cyberworlds, pp 186\u2013191","DOI":"10.1109\/CW.2008.28"},{"key":"9343_CR71","doi-asserted-by":"crossref","unstructured":"Sit E, Morris R (2002) Security considerations for peer-to-peer distributed hash tables. In: IPTPS\u201901: revised papers from the 1st international workshop on peer-to-peer systems. Springer, pp 261\u2013269","DOI":"10.1007\/3-540-45748-8_25"},{"key":"9343_CR72","doi-asserted-by":"crossref","unstructured":"Sun B, Chen H (2011) Communication security in MAS with XML security specifications. Appl Mech Mater 65:251\u2013254","DOI":"10.4028\/www.scientific.net\/AMM.65.251"},{"key":"9343_CR73","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1023\/A:1024172719965","volume":"7","author":"K Sycara","year":"2003","unstructured":"Sycara K, Paolucci M, Van Velsen M, Giampapa J (2003) The RETSINA MAS infrastructure. Auton Agents Multi Agent Syst 7: 29\u201348","journal-title":"Auton Agents Multi Agent Syst"},{"key":"9343_CR74","unstructured":"Tan H, Moreau L (2002) Extending execution tracing for mobile code security. In: 2nd International workshop on security of mobile multiAgent systems (SEMAS 2002), Bologna, pp 51\u201359"},{"key":"9343_CR75","unstructured":"Tan JJ, Poslad S, Xi Y (2004) Policy driven systems for dynamic security reconfiguration. In: Proceedings of the 3rd international joint conference on autonomous agents and multiagent systems (AAMAS), vol 3. IEEE Computer Society, pp 1274\u20131275"},{"key":"9343_CR76","doi-asserted-by":"crossref","unstructured":"Tekbacak F, Tuglular T, Dikenelli O (2009) An architecture for verification of access control policies with multi agent system ontologies. In: COMPSAC\u201909: Proceedings of the 2009 33rd annual IEEE international computer software and applications conference. IEEE Computer Society, pp 52\u201355","DOI":"10.1109\/COMPSAC.2009.114"},{"key":"9343_CR77","unstructured":"Tekbacak F, Tuglular T, Dikenelli O (2011) Policies for role based agents in environments with changing ontologies. In: The 10th international conference on autonomous agents and multiagent systems (AAMAS 11), Taipei, pp 1335\u20131336"},{"key":"9343_CR78","unstructured":"Thirunavukkarasu C, Finin T, Mayfield J (1995) Secret agents\u2014a security architecture for the KQML agent communication language. In: Intelligent information agents workshop (CIKM\u201995)"},{"key":"9343_CR79","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-72442-3","volume-title":"Security for telecommunications networks: future directions and challenges","author":"P Traynor","year":"2008","unstructured":"Traynor P, McDaniel P, Porta TL (2008) Security for telecommunications networks: future directions and challenges. Springer, US"},{"key":"9343_CR80","doi-asserted-by":"crossref","unstructured":"van\u2019t Noordende G, Brazier FM, Tanenbaum AS (2004) Security in a mobile agent system. In: The 1st IEEE symposium on multi-agent security and survivability, pp 35\u201345","DOI":"10.1109\/MASSUR.2004.1368416"},{"key":"9343_CR81","first-page":"363","volume":"3","author":"GJ van\u2019t Noordende","year":"2009","unstructured":"van\u2019t Noordende GJ, Overeinder BJ, Timmer RJ, Brazier FM, Tanenbaum AS (2009) Constructing secure mobile agent systems using the agent operating system. Int J Intell Inf Database Syst (IJIIDS) 3: 363\u2013381","journal-title":"Int J Intell Inf Database Syst (IJIIDS)"},{"key":"9343_CR82","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/S0933-3657(03)00005-8","volume":"27","author":"J Vazquez-Salceda","year":"2003","unstructured":"Vazquez-Salceda J, Padget JA, Cortes U, Lopez-Navidad A, Caballero F (2003) Formalizing an electronic institution for the distribution of human tissues. Artif Intell Med 27: 233\u2013258","journal-title":"Artif Intell Med"},{"key":"9343_CR83","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.cose.2006.12.003","volume":"26","author":"X Vila","year":"2007","unstructured":"Vila X, Schuster A, Riera A (2007) Security for a multi-agent system based on JADE. Comput Secur 26: 391\u2013400","journal-title":"Comput Secur"},{"key":"9343_CR84","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1016\/j.csi.2008.03.017","volume":"31","author":"S Vitabile","year":"2008","unstructured":"Vitabile S, Conti V, Militello C, Sorbello F (2008) An extended JADE-S based framework for developing secure multi-agent systems. Comput Stand Interfaces 31: 913\u2013930","journal-title":"Comput Stand Interfaces"},{"key":"9343_CR85","doi-asserted-by":"crossref","unstructured":"Wagner G (1997) Multi-level security in multiagent systems. In: Proceedings of the 1st international workshop on cooperative information agents. Springer, London, pp 272\u2013285","DOI":"10.1007\/3-540-62591-7_40"},{"key":"9343_CR86","doi-asserted-by":"crossref","unstructured":"Wahbe R, Lucco S, Anderson T (1993) Efficient software-based fault isolation. In: The 14th ACM symposium on operating systems principles, pp 203\u2013216","DOI":"10.1145\/173668.168635"},{"key":"9343_CR87","doi-asserted-by":"crossref","unstructured":"Wang H, Varadharajan V, Zhang Y (1999) A secure communication scheme for multiagent systems. In: PRIMA\u201998: selected papers from the 1st Pacific Rim international workshop on multi-agents, multiagent platforms, vol 1599. Springer, London, pp 174\u2013185","DOI":"10.1007\/3-540-48826-X_13"},{"key":"9343_CR88","unstructured":"Wong HC, Sycara K (1999) Adding security and trust to multi-agent systems. In: Proceedings of autonomous agents\u201999 workshop on deception, fraud, and trust in agent societies, pp 149\u2013161"},{"key":"9343_CR89","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1016\/j.infsof.2008.05.005","volume":"51","author":"L Xiao","year":"2009","unstructured":"Xiao L (2009) An adaptive security model using agent-oriented MDA. Inf Softw Technol 51: 933\u2013955","journal-title":"Inf Softw Technol"},{"key":"9343_CR90","unstructured":"Yu E, Cysneiros LM (2002) Designing for privacy and other competing requirements. In: 2nd Symposium on requirements engineering for information security (SREIS TM 02), Raleigh"},{"key":"9343_CR91","unstructured":"Yue X, Qiu X, Ji Y, Zhang C (2009) P2P attack taxonomy and relationship analysis. In: ICACT\u201909: Proceedings of the 11th international conference on advanced communication technology. IEEE Press, pp 1207\u20131210"},{"key":"9343_CR92","first-page":"17","volume":"32","author":"A Zaslavsky","year":"2004","unstructured":"Zaslavsky A, Indrawan M (2004) A buddy model of security for mobile agent communities operating in pervasive scenarios. Proc. Australas Inf Secur Data Mining Web Intell Softw Int 32: 17\u201325","journal-title":"Proc. Australas Inf Secur Data Mining Web Intell Softw Int"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-012-9343-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-012-9343-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-012-9343-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T15:37:01Z","timestamp":1561736221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-012-9343-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,16]]},"references-count":92,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["9343"],"URL":"https:\/\/doi.org\/10.1007\/s10462-012-9343-1","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,16]]}}}