The Scalability of A Multi-agent System in Security Services

نویسندگان

  • Ronggong Song
  • Larry Korba
چکیده

Permission is granted to quote short excerpts and to reproduce figures and tables from this report, provided that the source of such material is fully acknowledged. Permission is granted to quote short excerpts and to reproduce figures and tables from this report, provided that the source of such material is fully acknowledged. Abstract Security services become important when developing practical multi-agent e-commerce systems. We first provide an overview of the multi-agent system scalability and model a multi-agent application system-a labor market case based on the JADE multi-agent platform. We then simulate the scalability of the multi-agent application system in security services, and analyze their effect. Finally, we offer additional research on the adaptation and self-organization of the multi-agent system to make the system better able to cope with large numbers of agents and to be more efficient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture

Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...

متن کامل

Load-Frequency Control: a GA based Bayesian Networks Multi-agent System

Bayesian Networks (BN) provides a robust probabilistic method of reasoning under uncertainty. They have been successfully applied in a variety of real-world tasks but they have received little attention in the area of load-frequency control (LFC). In practice, LFC systems use proportional-integral controllers. However since these controllers are designed using a linear model, the nonlinearities...

متن کامل

Security and Trust in Agent-Oriented Middleware

Spreading of technologies as peer-to-peer networks, web services, multi-agent systems, ubiquitous computing, shows a clear trend toward open and highly distributed systems, requiring wide and dynamic overlay networks. But mass adoption of these technologies, especially in contexts where sensible resources are handled, will come true only if they will be able to guarantee a proper level of secur...

متن کامل

Scalability of Agent-Based Onion Routing Network

Security and anonymity are vital for some types of agent-based e-commerce applications. In order to provide secure and anonymous communication protection for multi-agent systems, we have developed an alternate Onion Routing approach based on agile agents under JADE multi-agent platform. In this paper, we present a simulation of the protocol and analyze its scalability.

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002