risk analysis and deployment security issues in a multi
play

Risk analysis and Deployment Security Issues in a Multi-agent System - PowerPoint PPT Presentation

Risk analysis and Deployment Security Issues in a Multi-agent System Ambra Molesini & Marco Prandini Elena Nardini & Enrico Denti { ambra.molesini, marco.prandini, elena.nardini, enrico.denti } @unibo.it Alma Mater Studiorum Universit`


  1. Risk analysis and Deployment Security Issues in a Multi-agent System Ambra Molesini & Marco Prandini Elena Nardini & Enrico Denti { ambra.molesini, marco.prandini, elena.nardini, enrico.denti } @unibo.it Alma Mater Studiorum —Universit` a di Bologna ICAART 2010, Valencia, Spain, 22nd January 2010 Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 1 / 23

  2. Case Study 1 Risk Analysis 2 Security Deployment Issues 3 Conclusions and Future Works 4 Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 2 / 23

  3. The objective of this paper Our work is aimed at performing a security analysis of a selected case study – an access control system [Molesini et al., 2009] – for Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 3 / 23

  4. The objective of this paper Our work is aimed at performing a security analysis of a selected case study – an access control system [Molesini et al., 2009] – for ▶ identifying threats coming both from ★ the system domain ★ its MAS-based implementation Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 3 / 23

  5. The objective of this paper Our work is aimed at performing a security analysis of a selected case study – an access control system [Molesini et al., 2009] – for ▶ identifying threats coming both from ★ the system domain ★ its MAS-based implementation ▶ assessing risks Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 3 / 23

  6. The objective of this paper Our work is aimed at performing a security analysis of a selected case study – an access control system [Molesini et al., 2009] – for ▶ identifying threats coming both from ★ the system domain ★ its MAS-based implementation ▶ assessing risks ▶ discussing deployment strategies that could interfere with the achievement of the application goal Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 3 / 23

  7. The objective of this paper Our work is aimed at performing a security analysis of a selected case study – an access control system [Molesini et al., 2009] – for ▶ identifying threats coming both from ★ the system domain ★ its MAS-based implementation ▶ assessing risks ▶ discussing deployment strategies that could interfere with the achievement of the application goal In order to do this we Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 3 / 23

  8. The objective of this paper Our work is aimed at performing a security analysis of a selected case study – an access control system [Molesini et al., 2009] – for ▶ identifying threats coming both from ★ the system domain ★ its MAS-based implementation ▶ assessing risks ▶ discussing deployment strategies that could interfere with the achievement of the application goal In order to do this we ▶ present our case study Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 3 / 23

  9. The objective of this paper Our work is aimed at performing a security analysis of a selected case study – an access control system [Molesini et al., 2009] – for ▶ identifying threats coming both from ★ the system domain ★ its MAS-based implementation ▶ assessing risks ▶ discussing deployment strategies that could interfere with the achievement of the application goal In order to do this we ▶ present our case study ▶ present the risk analysis phase Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 3 / 23

  10. The objective of this paper Our work is aimed at performing a security analysis of a selected case study – an access control system [Molesini et al., 2009] – for ▶ identifying threats coming both from ★ the system domain ★ its MAS-based implementation ▶ assessing risks ▶ discussing deployment strategies that could interfere with the achievement of the application goal In order to do this we ▶ present our case study ▶ present the risk analysis phase ▶ discuss about security deployment issues Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 3 / 23

  11. Background MASs should be conceived also as providers of security functionalities Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 4 / 23

  12. Background MASs should be conceived also as providers of security functionalities The flexibility of the agent paradigm proves very valuable in Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 4 / 23

  13. Background MASs should be conceived also as providers of security functionalities The flexibility of the agent paradigm proves very valuable in ▶ modelling the different aspects of security schemes Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 4 / 23

  14. Background MASs should be conceived also as providers of security functionalities The flexibility of the agent paradigm proves very valuable in ▶ modelling the different aspects of security schemes ▶ capturing the concepts needed for achieving a robust design at the most appropriate abstraction levels Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 4 / 23

  15. Background MASs should be conceived also as providers of security functionalities The flexibility of the agent paradigm proves very valuable in ▶ modelling the different aspects of security schemes ▶ capturing the concepts needed for achieving a robust design at the most appropriate abstraction levels However, a MAS needs a complex underlying infrastructure, whose intrinsic security is fundamental for the correct Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 4 / 23

  16. Background MASs should be conceived also as providers of security functionalities The flexibility of the agent paradigm proves very valuable in ▶ modelling the different aspects of security schemes ▶ capturing the concepts needed for achieving a robust design at the most appropriate abstraction levels However, a MAS needs a complex underlying infrastructure, whose intrinsic security is fundamental for the correct ▶ behaviour of agents Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 4 / 23

  17. Background MASs should be conceived also as providers of security functionalities The flexibility of the agent paradigm proves very valuable in ▶ modelling the different aspects of security schemes ▶ capturing the concepts needed for achieving a robust design at the most appropriate abstraction levels However, a MAS needs a complex underlying infrastructure, whose intrinsic security is fundamental for the correct ▶ behaviour of agents ▶ implementation of the policy to be enforced Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 4 / 23

  18. Background MASs should be conceived also as providers of security functionalities The flexibility of the agent paradigm proves very valuable in ▶ modelling the different aspects of security schemes ▶ capturing the concepts needed for achieving a robust design at the most appropriate abstraction levels However, a MAS needs a complex underlying infrastructure, whose intrinsic security is fundamental for the correct ▶ behaviour of agents ▶ implementation of the policy to be enforced Various solutions exist for the design of MAS-supporting platforms and for exploiting a MAS as a security provider [Yamazaki et al., 2004, Bordini et al., 2006, JADE, 2005] . . . Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 4 / 23

  19. Background MASs should be conceived also as providers of security functionalities The flexibility of the agent paradigm proves very valuable in ▶ modelling the different aspects of security schemes ▶ capturing the concepts needed for achieving a robust design at the most appropriate abstraction levels However, a MAS needs a complex underlying infrastructure, whose intrinsic security is fundamental for the correct ▶ behaviour of agents ▶ implementation of the policy to be enforced Various solutions exist for the design of MAS-supporting platforms and for exploiting a MAS as a security provider [Yamazaki et al., 2004, Bordini et al., 2006, JADE, 2005] . . . . . . but the field of their security assessment is largely unexplored Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 4 / 23

  20. Our case study Reference domain: access control system Case study: management of the access control to a university building [Molesini et al., 2009] System’s scenario: Faculty building a) classroom department library administration b) dep-library office dep-administration office c) office d) Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 5 / 23

  21. The developing methodology The case study was analysed and designed [Molesini et al., 2009] according to SODA SODA is an agent-oriented methodology for the analysis and design of agent-based systems ▶ . . . adopts agents and artifacts (A&A meta-model) as the main building blocks for MAS development ★ agents model individual and social activities ★ artifacts are adopted for the environment engineering since they glue agents together, as well as MAS and the environment Molesini (Univ. Bologna) Risk analysis ICAART 2010, 22/01/2010 6 / 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend