Skip to main content

Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems

  • Conference paper
Security in Pervasive Computing

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2802))

  • 833 Accesses

Abstract

We show how security requirements, in particular confidentiality requirements, for a whole multiagent system can formally be decomposed into confidentiality requirements for the agents. The decomposition assumes that there is some control over, or trust in, a subset of the agents and that the platform is trusted to satisfy certain reasonable assumptions. It is generic over the internal execution model of the agents. The decomposition is carried out in full detail for one specific class of confidentiality requirements, yielding a theorem that can be directly applied to derive confidentiality requirements for single agents from the overall requirement. Similar decompositions for other global requirements or under slightly different assumptions about the platform can be carried out along the same lines.

For expressing security requirements we use an existing framework for possibilistic information flow control, profitting from, e.g., the framework’s available composition results. The decomposition, because it is carried out formally and rests on a well-studied framework, is fully rigorous and the resulting property of the overall system is well-understood.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Biskup, J., Bonatti, P.: Confidentiality policies and their enforcement for controlled query evaluation. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, p. 39. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Hutter, D., Mantel, H., Schairer, A.: Informationsflusskontrolle als Grundlage für die Sicherheit von Multiagentensystemen. Praxis der Informationsverarbeitung und Kommunikation 26(1) (2003)

    Google Scholar 

  3. Mantel, H.: Possibilistic definitions of security – an assembly kit. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop (2000)

    Google Scholar 

  4. Mantel, H.: Unwinding possibilistic security properties. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Mantel, H.: On the composition of secure systems. In: Proceedings of the IEEE Symposium on Security and Privacy (2002)

    Google Scholar 

  6. Mantel, H., Sabelfeld, A.: A generic approach to the security of multi-threaded programs. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop (2001)

    Google Scholar 

  7. Reiser, H., Vogt, G.: Security requirements for management systems using mobile agents. In: Proceedings of the 5th IEEE Symposium on Computers and Communications (2000)

    Google Scholar 

  8. Schaefer, I.: Secure mobile multiagent systems in virtual marketplaces. A case study on comparison shopping. Research Report RR-02-02, Deutsches Forschungszentrum für Künstliche Intelligenz, DFKI GmbH (2002)

    Google Scholar 

  9. Subrahmanian, V.S., Bonatti, P., Dix, J., Eiter, T., Kraus, S., Özcan, F., Ross, R.: Secure agent programs. In: Heterogeneous Agent Systems, ch. 10, MIT Press, Cambridge (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schairer, A. (2004). Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds) Security in Pervasive Computing. Lecture Notes in Computer Science, vol 2802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39881-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39881-3_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20887-7

  • Online ISBN: 978-3-540-39881-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics