Table of Contents
Advances in Software Engineering
Volume 2011, Article ID 281517, 9 pages
Research Article

Multiagent Systems Protection

Escuela Técnica Superior de Ingeniería Informática, Universidad de Málaga, Spain

Received 1 December 2010; Revised 14 March 2011; Accepted 9 June 2011

Academic Editor: Kamel Barkaoui

Copyright © 2011 Antonio Muñoz et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. Hewitt and H. Baker, “Actors and continuous functionals,” 1977. View at Google Scholar
  2. H. S. Nwana, “Software agents: an overview,” The Knowledge Engineering Review, vol. 11, no. 3, pp. 205–244, 1996. View at Google Scholar
  3. N. R. Jennings and K. Sycara, “A roadmap of agent research and development,” 1998. View at Google Scholar
  4. B. Chaib-draa, “Industrial applications of distributed AI,” Communications of the ACM, vol. 38, no. 11, p. 4, 1995. View at Google Scholar
  5. H. Wang and C. Wang, “Intelligent agents in the nuclear industry,” Computer, vol. 30, no. 11, pp. 28–34, 1997. View at Google Scholar
  6. U. M. Schwuttke and A. G. Quan, “Enhancing performance of cooperating agents in real-time diagnostic systems,” in Proceedings of the 13th international Joint Conference on Artifical intelligence (IJCAI '93), pp. 332–337, Chambery, France, 1993.
  7. A. Maña, A. Muñoz, and D. Serrano, “Towards secure agent computing for ubiquitous computing and ambient intelligence,” in Ubiquitous Intelligence and Computing, vol. 4611 of Lecture Notes in Computer Science, pp. 1201–1212, Springer, New York, NY, USA, 2007. View at Google Scholar
  8. G. C. Necula, “Proof-carrying code,” in Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '97), pp. 106–119, ACM, New York, NY, USA, 1997.
  9. B. S. Yee, “Secure Internet programming,” in A Sanctuary for Mobile Agents, pp. 261–273, Springer, London, UK, 1999. View at Google Scholar
  10. J. P. Stern, G. Hachez, F. Koeune, and J.-J. Quisquater, “Robust object watermarking: application to code,” in Proceedings of the 3rd International Workshop on Information Hiding (IH '99), pp. 368–378, Springer, 2000.
  11. G. Hachez, A comparative study of software protection tools suited for E-commerce with contributions to software watermarking and smart cards, Ph.D. thesis, Universite Catholique de Louvain, March 2003.
  12. C. S. Collberg and C. Thomborson, “Watermarking, tamper-proofing, and obfuscation—tools for software protection,” IEEE Transactions on Software Engineering, vol. 28, no. 8, pp. 735–746, 2002. View at Publisher · View at Google Scholar
  13. S. Katzenbeisser and F. A. Petitcolas, Eds., Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, Mass, USA, 1st edition, 2000.
  14. O. Goldreich, “Towards a theory of software protection and simulation by oblivious rams,” in Proceedings of the 9th Annual ACM Symposium on Theory of Computing (STOC '87), pp. 182–194, ACM, 1987.
  15. T. Sander and C. F. Tschudin, “On software protection via function hiding,” in Information Hiding, D. Aucsmith, Ed., vol. 1525 of Lecture Notes in Computer Science, pp. 111–123, Springer, 1998. View at Google Scholar
  16. S. Pearson, Trusted Computing Platforms: TCPA Technology in Context, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2002.
  17. A. Maña and A. Muñoz, “Mutual protection for multiagent systems,” in Proceedings of the 3rd International Workshop on Safety and Security in Multiagent Systems, p. 37, Citeseer, Hakodate, Japan, 2007.
  18. A. Maña, J. Lopez, J. J. Ortega, E. Pimentel, and J. M. Troya, “A framework for secure execution of software,” International Journal of Information Security, vol. 3, no. 2, pp. 99–112, 2004. View at Google Scholar
  19. Apache Software Foundation, BCEL (Byte Code Engineering Library), 2006.
  20. S. Chiba, Javassist (Java Programming Assistant), Sun Microsystems, 2009.
  21. OW2 Consortium. ASM.
  22. T. Lindholm and F. Yellin, The JavaTM Virtual Machine Specification, Sun Microsystem, 1999.