正在加载图片...
·432· 智能系统学报 第15卷 FALCONE R,BARBER S,KORBA L,et al.Trust, [29]VITABILE S.CONTI V,MILITELLO C,et al.An exten- Reputation,and Security:Theories and Practice.Berlin, ded JADE-S based framework for developing secure Germany:Springer,2003:163-176. Multi-Agent Systems[J].Computer standards inter- [18]BRESCIANI P,PERINI A,GIORGINI P,et al.Tropos: faces,2009,31(5:913-930. an agent-oriented software development methodology[J]. [30]JANSEN W A.Countermeasures for mobile agent secur- Autonomous agents and multi-agent systems,2004,8(3): ity[J].Computer communications,2000,23(17): 203-236. 1667-1676. [19]MOURATIDIS H,GIORGINI P.Secure tropos:a secur- [31]ROTH V.Secure recording of itineraries through co-oper- ity-oriented extension of the tropos methodology[J.Inter- ating agents[C]//Proceedings of 1998 European Confer- national journal of software engineering and knowledge ence on Object-Oriented Programming.Belgium,Ger- engineering,2007,17(2):285-309. many,1998:297-298. [20]MOURATIDIS H,GIORGINI P.Enhancing secure tro- [32]FARMER W M,GUTTMAN J D,SWARUP V.Security pos to effectively deal with security requirements in the for mobile agents:authentication and state appraisal[C]// development of multiagent systems[M]//BARLEY M, Proceedings of the 4th European Symposium on Re- MOURATIDIS H,UNRUH A,et al.Safety and Security search in Computer Security.Rome,Italy,1996:118-130. in Multiagent Systems.Berlin:Springer,2009:8-26. [33]NECULA G C,LEE P.Safe,untrusted agents using [21]BEYDOUN G,LOW G,MOURATIDIS H,et al.A se- proof-carrying code[M]//VIGNA G.Mobile Agents and curity-aware metamodel for multi-agent systems(MAS)J]. Security.Berlin:Springer,1998:61-91. Information and software technology,2009,51(5): [34]PARUCHURI P,TAMBE M.ORDONEZ F.et al.Secur- 832-845. ity in multiagent systems by policy randomization[C]// [22]MORADIAN E.Security of E-commerce software sys- Proceedings of the 5th International Joint Conference on tems[M]//HAKANSSON A,HARTUNG R.Agent and Autonomous Agents and Multiagent Systems.Hakodate. Multi-Agent Systems in Distributed Systems-Digital Eco- Japan,2006 nomy and E-Commerce.Berlin:Springer,2013:95-103. [35]OLFATI-SABER R.FAX J A.MURRAY R M.Con- [23]BASHEER G S,AHMAD MS,TANG A Y C,et al.Cer- sensus and cooperation in networked multi-agent tainty,trust and evidence:towards an integrative model of systems[J].Proceedings of the IEEE,2007,95(1): confidence in multi-agent systems[J].Computers in hu- 215-233. man behavior,.2015,45:307-315. [36]HE Wangli,GAO Xiaoyang,ZHONG Weimin,et al.Se- [24]ZIKRATOV I.MASLENNIKOV O,LEBEDEV I,et al. cure impulsive synchronization control of multi-agent Dynamic trust management framework for robotic multi- systems under deception attacks[J.Information sciences, agent systems[C]//Proceedings of the 16th International 2018.459:354-368. Conference on Internet of Things,Smart Spaces,and Next [37]AMULLEN E M.SHETTY S,KEEL L H.Secured form- Generation Networks and Systems.Petersburg,Russia, ation control for multi-agent systems under DoS 2016 attacks[C]//Proceedings of 2016 IEEE Symposium on [25]CHERIBI H,KHOLLADI M K.A security model for Technologies for Homeland Security.Waltham,USA, complex applications based on normative multi-agents 2016. system[C]//Proceedings of the 2015 2nd International [38]DE LA TORRE G.YUCELEN T.PETERSON J D.Resi- Conference on Information Security and Cyber Forensics. lient networked multiagent systems:a distributed adapt- Cape Town,South Africa,2015:41-46 ive control approachy[C]//Proceedings of the 53rd IEEE [26]MAJD E,BALAKRISHNAN V.A trust model for re- Conference on Decision and Control.Los Angeles,USA, commender agent systems[J].Soft computing-a fusion 2014. of foundations,methodologies and applications,2017, [39]伍益明.恶意攻击下的多智能体系统安全一致性问题 21(2):417-433. 研究D1.杭州:浙江工业大学,2016 [27]BURKLE A,HERTEL A,MULLER W,et al.Evaluating WU Yiming.Research on secure consensus for multi- the security of mobile agent platforms[J].Autonomous agent systems under malicious attacks[D].Hangzhou: agents and multi-agent systems,2009,18(2):295-311. Zhejiang University of Technology,2016. [28]VILA X.SCHUSTER A,RIERA A.Security for a multi- [40]LIU S,XIE L,ZHANG H,et al.Distributed consensus for agent system based on JADE[J].Computers security, multi-agent systems with delays and noises in transmis- 2007,26(5)391-400. sion channels[J].Automatica,2011,47(5):920-934.FALCONE R, BARBER S, KORBA L, et al. Trust, Reputation, and Security: Theories and Practice. Berlin, Germany: Springer, 2003: 163–176. BRESCIANI P, PERINI A, GIORGINI P, et al. Tropos: an agent-oriented software development methodology[J]. Autonomous agents and multi-agent systems, 2004, 8(3): 203–236. [18] MOURATIDIS H, GIORGINI P. Secure tropos: a secur￾ity-oriented extension of the tropos methodology[J]. Inter￾national journal of software engineering and knowledge engineering, 2007, 17(2): 285–309. [19] MOURATIDIS H, GIORGINI P. Enhancing secure tro￾pos to effectively deal with security requirements in the development of multiagent systems[M]//BARLEY M, MOURATIDIS H, UNRUH A, et al. Safety and Security in Multiagent Systems. Berlin: Springer, 2009: 8–26. [20] BEYDOUN G, LOW G, MOURATIDIS H, et al. A se￾curity-aware metamodel for multi-agent systems (MAS)[J]. Information and software technology, 2009, 51(5): 832–845. [21] MORADIAN E. Security of E-commerce software sys￾tems[M]//HAKANSSON A, HARTUNG R. Agent and Multi-Agent Systems in Distributed Systems-Digital Eco￾nomy and E-Commerce. Berlin: Springer, 2013: 95–103. [22] BASHEER G S, AHMAD M S, TANG A Y C, et al. Cer￾tainty, trust and evidence: towards an integrative model of confidence in multi-agent systems[J]. Computers in hu￾man behavior, 2015, 45: 307–315. [23] ZIKRATOV I, MASLENNIKOV O, LEBEDEV I, et al. Dynamic trust management framework for robotic multi￾agent systems[C]//Proceedings of the 16th International Conference on Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Petersburg, Russia, 2016. [24] CHERIBI H, KHOLLADI M K. A security model for complex applications based on normative multi-agents system[C]//Proceedings of the 2015 2nd International Conference on Information Security and Cyber Forensics. Cape Town, South Africa, 2015:41–46. [25] MAJD E, BALAKRISHNAN V. A trust model for re￾commender agent systems[J]. Soft computing — a fusion of foundations, methodologies and applications, 2017, 21(2): 417–433. [26] BÜRKLE A, HERTEL A, MÜLLER W, et al. Evaluating the security of mobile agent platforms[J]. Autonomous agents and multi-agent systems, 2009, 18(2): 295–311. [27] VILA X, SCHUSTER A, RIERA A. Security for a multi￾agent system based on JADE[J]. Computers & security, 2007, 26(5): 391–400. [28] VITABILE S, CONTI V, MILITELLO C, et al. An exten￾ded JADE-S based framework for developing secure Multi-Agent Systems[J]. Computer standards & inter￾faces, 2009, 31(5): 913–930. [29] JANSEN W A. Countermeasures for mobile agent secur￾ity[J]. Computer communications, 2000, 23(17): 1667–1676. [30] ROTH V. Secure recording of itineraries through co-oper￾ating agents[C]//Proceedings of 1998 European Confer￾ence on Object-Oriented Programming. Belgium, Ger￾many, 1998: 297–298. [31] FARMER W M, GUTTMAN J D, SWARUP V. Security for mobile agents: authentication and state appraisal[C]// Proceedings of the 4th European Symposium on Re￾search in Computer Security. Rome, Italy, 1996: 118–130. [32] NECULA G C, LEE P. Safe, untrusted agents using proof-carrying code[M]//VIGNA G. Mobile Agents and Security. Berlin: Springer, 1998: 61–91. [33] PARUCHURI P, TAMBE M, ORDÓÑEZ F, et al. Secur￾ity in multiagent systems by policy randomization[C]// Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems. Hakodate, Japan, 2006. [34] OLFATI-SABER R, FAX J A, MURRAY R M. Con￾sensus and cooperation in networked multi-agent systems[J]. Proceedings of the IEEE, 2007, 95(1): 215–233. [35] HE Wangli, GAO Xiaoyang, ZHONG Weimin, et al. Se￾cure impulsive synchronization control of multi-agent systems under deception attacks[J]. Information sciences, 2018, 459: 354–368. [36] AMULLEN E M, SHETTY S, KEEL L H. Secured form￾ation control for multi-agent systems under DoS attacks[C]//Proceedings of 2016 IEEE Symposium on Technologies for Homeland Security. Waltham, USA, 2016. [37] DE LA TORRE G, YUCELEN T, PETERSON J D. Resi￾lient networked multiagent systems: a distributed adapt￾ive control approachy[C]//Proceedings of the 53rd IEEE Conference on Decision and Control. Los Angeles, USA, 2014. [38] 伍益明. 恶意攻击下的多智能体系统安全一致性问题 研究 [D]. 杭州: 浙江工业大学, 2016. WU Yiming. Research on secure consensus for multi￾agent systems under malicious attacks[D]. Hangzhou: Zhejiang University of Technology, 2016. [39] LIU S, XIE L, ZHANG H, et al. Distributed consensus for multi-agent systems with delays and noises in transmis￾sion channels[J]. Automatica, 2011, 47(5): 920–934. [40] ·432· 智 能 系 统 学 报 第 15 卷
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有