Multi-agent systems and security requirements analysis

Bresciani, Paolo and Giorgini, Paolo and Mouratidis, Haralambos and Manson, Gordon (2004) ‘Multi-agent systems and security requirements analysis’, in Lucena, C. (ed.) Software engineering for multi-agent systems II: research issues and practical applications 2004 vol. 2940 pp, pp. 35-48.

[img]
Preview
Text
Bresciani, P et al (2004) SELMAS 03 pp 35-48.pdf - Accepted Version
Available under License Creative Commons Attribution No Derivatives.

Download (114Kb) | Preview
Official URL: http://dx.doi.org/10.1007/b96018

Abstract

Agent Oriented Software Engineering (AOSE) is a software paradigm that has grasped the attention of researchers the last few years. As a result, many different methods have been introduced to help developers in the development of multi-agent systems. However, so far, these methods have mainly neglected security requirements. The common approach towards the inclusion of security within a system is to identify security requirements after the definition of the system. However, this approach has provoked the emergence of computer systems afflicted with security vulnerabilities. In this paper we propose an analysis, based on the measures of criticality (how critical an actor of the system is) and complexity (represents the effort required by the actors of the system to achieve the requirements that have been imposed to them), which aims to identify possible bottlenecks of a multi-agent system with respect to security. An integrated agent-based health and social care information system is used as a case study throughout this paper.

Item Type: Book Section
Additional Information: Citation: Bresciani, P. et al. (2004) ‘Multi-agent systems and security requirements analysis’ In Lucena, C et al (eds) Software engineering for multi-agent systems II: research issues and practical applications 2004 vol. 2940 pp. 35-48.
Divisions: Schools > Architecture Computing and Engineering, School of
Depositing User: Mr Stephen Grace
Date Deposited: 13 Jan 2010 13:08
Last Modified: 27 Sep 2012 11:59
URI: http://hdl.handle.net/10552/477

Actions (login required)

View Item View Item