{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:01:59Z","timestamp":1772060519392,"version":"3.50.1"},"reference-count":90,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T00:00:00Z","timestamp":1307145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s10462-011-9228-8","type":"journal-article","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T15:22:55Z","timestamp":1307114575000},"page":"239-260","source":"Crossref","is-referenced-by-count":47,"title":["A survey of security issue in multi-agent systems"],"prefix":"10.1007","volume":"37","author":[{"given":"Youna","family":"Jung","sequence":"first","affiliation":[]},{"given":"Minsoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Amirreza","family":"Masoumzadeh","sequence":"additional","affiliation":[]},{"given":"James B. D.","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,4]]},"reference":[{"key":"9228_CR1","first-page":"1","volume-title":"CRYPTO 1991, LNCS 576","author":"M Abadi","year":"1992","unstructured":"Abadi M, Burrows M, Lampson B, Plotkin G (1992) A calculus for access control in distributed systems. In: Feigenbaum J (eds) CRYPTO 1991, LNCS 576. Springer, Berlin, pp 1\u201323"},{"key":"9228_CR2","unstructured":"Abdul-Rahman A (2005) A framework for decentralised trust reasoning. Ph.D. Thesis, Department of Computer Science, University College London, UK"},{"key":"9228_CR3","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: Proceedings of the 33rd international conference on system sciences. IEEE Computer Society, p 6007","DOI":"10.1109\/HICSS.2000.926814"},{"key":"9228_CR4","unstructured":"Aglets (2002) Aglets. http:\/\/www.trl.ibm.com\/aglets\/ . Accessed 1 Apr 2011"},{"key":"9228_CR5","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D Arts","year":"2007","unstructured":"Arts D, Gil Y (2007) A survey of trust in computer science and the semantic web. J Web Semant 5: 58\u201371","journal-title":"J Web Semant"},{"key":"9228_CR6","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-48165-6_2","volume-title":"Intelligent agents for telecommunication applications, LNCS 1699","author":"C B\u00e4umer","year":"1999","unstructured":"B\u00e4umer C, Magedanz T (1999) Grasshopper\u2014a mobile agent platform for active telecommunication networks. In: Albayrak S (eds) Intelligent agents for telecommunication applications, LNCS 1699. Springer, Berlin, pp 19\u201332"},{"key":"9228_CR7","doi-asserted-by":"crossref","unstructured":"Bell DE, La Padula L (1976) Secure computer system: unified exposition and multics interpretation. ESD-TR-75-306 ESA\/AFSC, The MITRE Corporation","DOI":"10.21236\/ADA023588"},{"key":"9228_CR8","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/3-540-68671-1_7","volume-title":"Mobile agents and security, LNCS 1419","author":"S Berkovits","year":"1998","unstructured":"Berkovits S, Guttman JD, Swarup V (1998) Authentication for mobile agents. In: Vigna G (eds) Mobile agents and security, LNCS 1419. Springer, Berlin, pp 114\u2013136"},{"issue":"3","key":"9228_CR9","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino E, Bonatti PA, Ferrari E (2001) TRBAC: a temporal role-based access control model. ACM Trans Inf Syst Security 4(3): 191\u2013233","journal-title":"ACM Trans Inf Syst Security"},{"key":"9228_CR10","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/11738817_8","volume-title":"Software engineering for multi-agent systems IV, LNCS 3914","author":"G Beydoun","year":"2006","unstructured":"Beydoun G, Gonzalez-Perez C, Henderson-Sellers B, Low G et\u00a0al (2006) Developing and evaluating a generic metamodel for MAS work products. In: Garcia A (eds) Software engineering for multi-agent systems IV, LNCS 3914. Springer, Berlin, pp 126\u2013142"},{"key":"9228_CR11","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1016\/j.infsof.2008.05.003","volume":"51","author":"G Beydoun","year":"2009","unstructured":"Beydoun G, Low G, Mouratidis H, Henderson-Sellers B (2009) A security-aware metamodel for multi-agent systems (MAS). Inf Softw Technol 51: 832\u2013845","journal-title":"Inf Softw Technol"},{"key":"9228_CR12","unstructured":"Boella G, van der Torre LWN (2004) Permission and authorization in policies for virtual communities of agents. In: Proceedings of the 3rd international workshop on agents and peer-to-peer computing, pp 86\u201397"},{"issue":"5","key":"9228_CR13","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1049\/ecej:20020504","volume":"14","author":"N Borselius","year":"2002","unstructured":"Borselius N (2002) Mobile agent security. Electron Commun Eng J 14(5): 211\u2013218","journal-title":"Electron Commun Eng J"},{"issue":"3","key":"9228_CR14","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P Bresciani","year":"2004","unstructured":"Bresciani P, Giorgini P, Giunchiglia F, Mylopoulos J, Perini A (2004a) TROPOS: an agent-oriented software development methodology. J Auton Agents Multi Agent Syst 8(3): 203\u2013236","journal-title":"J Auton Agents Multi Agent Syst"},{"key":"9228_CR15","doi-asserted-by":"crossref","unstructured":"Bresciani P, Giorgini P, Mouratidis H, Manson G (2004b) Multi-agent systems and security requirements analysis. In: Proceedings of software engineering for multi-agent systems, LNCS 2940. Springer, Berlin, pp 35\u201348","DOI":"10.1007\/978-3-540-24625-1_3"},{"issue":"2","key":"9228_CR16","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s10458-008-9043-z","volume":"18","author":"A B\u00fcrkle","year":"2009","unstructured":"B\u00fcrkle A, Hertel A, M\u00fcller W, Wieser M (2009) Evaluating the security of mobile agent platforms. Auton Agents Multi Agent Syst 18(2): 295\u2013311","journal-title":"Auton Agents Multi Agent Syst"},{"key":"9228_CR17","doi-asserted-by":"crossref","unstructured":"Chandran SM, Joshi JBD (2005) LoT RBAC: a location and time-based RBAC model. In: Proceedings of the 6th international conference on web information systems engineering (WISE 2005)","DOI":"10.1007\/11581062_27"},{"key":"9228_CR18","unstructured":"Chess D, Harrison C, Kershenbaum A (1996) Mobile agents: are they a good idea? In: Proceedings of 2nd international workshop on mobile object systems, LNCS 1222. Springer, Berlin, pp 25\u201347"},{"key":"9228_CR19","doi-asserted-by":"crossref","unstructured":"Covington M, Fogla P, Zhan Z, Ahamad M (2002) A context-aware security architecture for emerging applications. In: Proceedings of the 18th annual computer security applications conference, pp 249\u2013258","DOI":"10.1109\/CSAC.2002.1176296"},{"key":"9228_CR20","first-page":"369","volume-title":"Coordination languages and models, LNCS 2906","author":"M Cremonini","year":"2000","unstructured":"Cremonini M, Omicini A, Zambonelli F (2000) Coordination and access control in open distributed agent systems: the TuCSoN approach. In: Porto A, Roman GC (eds) Coordination languages and models, LNCS 2906. Springer, Berlin, pp 369\u2013390"},{"issue":"1","key":"9228_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1210263.1210265","volume":"10","author":"M Damiani","year":"2007","unstructured":"Damiani M, Bertino E, Catania B, Perlasca P (2007) GEO-RBAC: a spatially aware RBAC. ACM Trans Inf Syst Security (TISSEC) 10(1): 1\u201342","journal-title":"ACM Trans Inf Syst Security (TISSEC)"},{"key":"9228_CR22","doi-asserted-by":"crossref","unstructured":"Farmer WM, Guttman J, Swarup V (1996) Security for mobile agents: authentication and state appraisal. In: Proceedings of the 4th European symposium on research in computer security, pp 118\u2013130","DOI":"10.1007\/3-540-61770-1_31"},{"key":"9228_CR23","volume-title":"Multi-agent system: an introduction to distributed artificial intelligence","author":"J Ferber","year":"1999","unstructured":"Ferber J (1999) Multi-agent system: an introduction to distributed artificial intelligence. Addison Wesley Longman, Harlow"},{"key":"9228_CR24","unstructured":"FIPA (2002a) FIPA abstract architecture specification, SC00001L. http:\/\/www.fipa.org\/specs\/fipa00001\/SC00001L.pdf"},{"key":"9228_CR25","unstructured":"FIPA (2002b) FIPA agent massage transport service specification, SC00067F. http:\/\/www.fipa.org\/specs\/fipa00067\/SC00067F.pdf"},{"key":"9228_CR26","unstructured":"FIPA (2002c) FIPA MAS security white paper, f-out-000113"},{"key":"9228_CR27","unstructured":"FIPA (2004) FIPA agent management specification, SC00023K. http:\/\/www.fipa.org\/specs\/fipa00023\/SC00023K.pdf"},{"key":"9228_CR28","doi-asserted-by":"crossref","unstructured":"Fischmeister S, Vigna G, Kemmerer RA (2001) Evaluating the security of three Java-based mobile agent systems. In: Proceedings of the 5th international conference on mobile agents, pp 31\u201341","DOI":"10.1007\/3-540-45647-3_3"},{"key":"9228_CR29","unstructured":"Franklin S, Graesser A (1996) Is it an agent, or just a program? a taxonomy for autonomous agents. In: Proceedings of the workshop on intelligent agents III, LNCS 1193. Agent Theories, Architectures, and Languages, London, pp 21\u201335"},{"key":"9228_CR30","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/S1571-0661(04)80338-4","volume":"63","author":"RA Ghanea-Hercock","year":"2001","unstructured":"Ghanea-Hercock RA, Gifford I (2001) Top-secret multi-agent systems. Electron Notes Theor Comput Sci 63: 77\u201390","journal-title":"Electron Notes Theor Comput Sci"},{"issue":"4","key":"9228_CR31","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T Grandison","year":"2000","unstructured":"Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv Tutor 3(4): 2\u201316","journal-title":"IEEE Commun Surv Tutor"},{"issue":"7","key":"9228_CR32","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/35.689634","volume":"36","author":"MS Greenberg","year":"1998","unstructured":"Greenberg MS, Byington JC, Harper DG (1998) Mobile agents and security. IEEE Commun Mag 36(7): 76\u201385","journal-title":"IEEE Commun Mag"},{"key":"9228_CR33","doi-asserted-by":"crossref","unstructured":"Griffiths N (2005) Task delegation using experience-based multi-dimensional trust. In: Proceedings of AAMAS\u201905, Utrecht, Netherlands, pp 489\u2013496","DOI":"10.1145\/1082473.1082548"},{"key":"9228_CR34","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/3-540-68671-1_6","volume-title":"Mobile agents and security, LNAI 1419","author":"F Hohl","year":"1998","unstructured":"Hohl F (1998) Time limited blackbox security: protecting mobile agents from malicious hosts. In: Vigna G (eds) Mobile agents and security, LNAI 1419. Springer, Berlin, pp 92\u2013113"},{"key":"9228_CR35","doi-asserted-by":"crossref","unstructured":"Hu Y, Tang C (2003) Agent-oriented public key infrastructure for multi-agent E-service. In: Proceedings of the 7th international conference on knowledge-based intelligent information and engineering systems, pp 114\u2013136","DOI":"10.1007\/978-3-540-45224-9_164"},{"key":"9228_CR36","doi-asserted-by":"crossref","unstructured":"Huynh D (2009) A personalized framework for trust assessment. In: Proceedings of ACM symposium on applied computing, Honolulu, pp 1302\u20131307","DOI":"10.1145\/1529282.1529574"},{"key":"9228_CR37","unstructured":"Huynh D, Jennings NR, Shadbolt NR (2004) FIRE: developing an integrated trust and reputation model for open multi-agent Systems. In: Proceedings of 16th ECAI, pp 18\u201322"},{"key":"9228_CR38","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"D Huynh","year":"2006","unstructured":"Huynh D, Jennings NR, Shadbolt NR (2006a) An integrated trust and reputation model for open multi-agent systems. Auton Agent Multi Agent Syst 13: 119\u2013154","journal-title":"Auton Agent Multi Agent Syst"},{"key":"9228_CR39","doi-asserted-by":"crossref","unstructured":"Huynh D, Jennings NR, Shadbolt NR (2006b) Certified reputation: how an agent can trust a stranger. In: Proceedings of AAMAS\u201906, Hakodate, Japan, pp 1217\u20131224","DOI":"10.1145\/1160633.1160854"},{"key":"9228_CR40","unstructured":"JADE (2007) http:\/\/jade.tilab.com\/"},{"issue":"17","key":"9228_CR41","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1016\/S0140-3664(00)00253-X","volume":"23","author":"WA Jansen","year":"2000","unstructured":"Jansen WA (2000) Countermeasure for mobile agent security. Comput Commun 23(17): 1667\u20131676","journal-title":"Comput Commun"},{"issue":"1","key":"9228_CR42","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1023\/A:1010090405266","volume":"1","author":"NR Jennings","year":"1998","unstructured":"Jennings NR, Sycara K, Wooldridge M (1998) A roadmap of agent research and development. Auton Agents Multi Agent Syst 1(1): 7\u201338","journal-title":"Auton Agents Multi Agent Syst"},{"issue":"1","key":"9228_CR43","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"JBD Joshi","year":"2005","unstructured":"Joshi JBD, Bertino E, Latif U, Ghafoor A (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1): 4\u201323","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9228_CR44","unstructured":"Jumping Beans (2006) http:\/\/jumpingbeans.com\/ , Accessed 1 Apr 2011"},{"key":"9228_CR45","doi-asserted-by":"crossref","unstructured":"Jung Y, Masoumzadeh A, Joshi JBD, Kim M (2008) RiBAC: role interaction based access control model for community computing. In: Proceedings of 4th international conference on collaborative computing: networking, applications and worksharing","DOI":"10.1007\/978-3-642-03354-4_23"},{"issue":"1","key":"9228_CR46","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"BW Lampson","year":"1974","unstructured":"Lampson BW (1974) Protection. SIGOPS Oper Syst Rev 8(1): 18\u201324","journal-title":"SIGOPS Oper Syst Rev"},{"key":"9228_CR47","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B Lampson","year":"1992","unstructured":"Lampson B, Abadi M, Burrows M, Wobber E (1992) Authentication in distributed systems: theory and practice. ACM Trans Comput Syst 10: 265\u2013310","journal-title":"ACM Trans Comput Syst"},{"key":"9228_CR48","doi-asserted-by":"crossref","unstructured":"Li B, Xing M, Zhu J, Che T (2008) A dynamic trust model for the multi-agent systems. In: Proceedings of international symposiums on information processing, pp 500\u2013504","DOI":"10.1109\/ISIP.2008.101"},{"issue":"1","key":"9228_CR49","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/S0004-3702(03)00063-8","volume":"149","author":"C Liau","year":"2003","unstructured":"Liau C (2003) Belief, information acquisition, and trust in multi-agent systems\u2014a modal logic formulation. Artif Intell 149(1): 31\u201360","journal-title":"Artif Intell"},{"key":"9228_CR50","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-540-92803-4_3","volume-title":"Trust in agent societies, LNAI 5396","author":"SN Lim Choi Keung","year":"2008","unstructured":"Lim Choi Keung SN, Griffiths N et\u00a0al (2008) Towards improved partner selection using recommendations and trust. In: Falcone R (eds) Trust in agent societies, LNAI 5396. Springer, Berlin, pp 43\u201364"},{"issue":"2","key":"9228_CR51","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis H (2007) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng (IJSEKE) 17(2): 285\u2013309","journal-title":"Int J Softw Eng Knowl Eng (IJSEKE)"},{"key":"9228_CR52","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1007\/978-3-642-04879-1_2","volume-title":"Safety and security in multiagent systems, LNAI 4324","author":"H Mouratidis","year":"2009","unstructured":"Mouratidis H, Giorgini P (2009) Enhancing secure tropos to effectively deal with security requirements in the development of multiagent systems. In: Barley M, Mouratidis H, Unruh A, Spears D, Scerri P, Massacci F (eds) Safety and security in multiagent systems, LNAI 4324. Springer, Berlin, pp 8\u201326"},{"key":"9228_CR53","doi-asserted-by":"crossref","unstructured":"Mouratidis H, Giorgini P, Manson G (2003) Modeling secure multiagent system. In: Proceedings of the 2nd international joint conference on autonomous agents and multiagent systems, Melbourne, pp 859\u2013866","DOI":"10.1145\/860575.860713"},{"key":"9228_CR54","doi-asserted-by":"crossref","unstructured":"Mui L, Mohtashemi M, Halberstadt A (2002) A computational model of trust and reputation. In: Proceedings of the 35th international conference on system science, pp 280\u2013287","DOI":"10.1109\/HICSS.2002.994181"},{"key":"9228_CR55","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-68671-1_5","volume-title":"Mobile agents and security, LNCS 1419","author":"GC Necula","year":"1998","unstructured":"Necula GC, Lee P (1998) Safe, untrusted agents using proof-carrying code. In: Vigna G (eds) Mobile agents and security, LNCS 1419. Springer, Berlin, pp 61\u201391"},{"key":"9228_CR56","doi-asserted-by":"crossref","unstructured":"Nov\u00e1k P, Rollo M, Hod\u00edk J, Vlcek T (2003) Communication security in multi-agent systems. In: Proceedings of the 3rd international central and eastern European conference on multi-agent systems, pp 454\u2013463","DOI":"10.1007\/3-540-45023-8_44"},{"issue":"5","key":"9228_CR57","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.entcs.2004.11.045","volume":"128","author":"A Omicini","year":"2005","unstructured":"Omicini A, Ricci A, Viroli M (2005) RBAC for organisation and security in an agent coordination infrastructure. Electron Notes Theor Comput Sci 128(5): 65\u201385","journal-title":"Electron Notes Theor Comput Sci"},{"key":"9228_CR58","first-page":"162","volume-title":"Trusting agents for trusting electronic societies, LNCS 3577","author":"A Poggi","year":"2004","unstructured":"Poggi A, Tomaiuolo M, Vitaglione G (2004) A security infrastructure for trust management in multi-agent systems. In: Falcone R, Barber S, Sabater-Mir J, Singh M (eds) Trusting agents for trusting electronic societies, LNCS 3577. Springer, Berlin, pp 162\u2013179"},{"key":"9228_CR59","doi-asserted-by":"crossref","unstructured":"Poslad S, Charlton P, Calisti M (2002) Specifying standard security mechanisms in multi-agent systems. In: Proceedings of autonomous agents and multi-agent systems (AAMAS 2002)","DOI":"10.1007\/3-540-36609-1_13"},{"key":"9228_CR60","doi-asserted-by":"crossref","unstructured":"Pujol JM, Sanguesa R, Delgado J (2002) Extracting reputation in multi agent systems by means of social network topology. In: Proceedings of autonomous agents and multi-agent systems (AAMAS 2002), Bologna, pp 467\u2013474","DOI":"10.1145\/544741.544853"},{"issue":"1","key":"9228_CR61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"SD Ramchurn","year":"2004","unstructured":"Ramchurn SD, Huynh D, Jennings NR (2004) Trust in multi-agent systems. Knowl Eng Rev 19(1): 1\u201325","journal-title":"Knowl Eng Rev"},{"issue":"12","key":"9228_CR62","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P Resnick","year":"2000","unstructured":"Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 43(12): 45\u201348","journal-title":"Commun ACM"},{"key":"9228_CR63","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-68671-1_2","volume-title":"Mobile agents and security, LNCS 1419","author":"J Riordan","year":"1998","unstructured":"Riordan J, Schneier B (1998) Environmental key generation towards clueless agents. In: Vigna G (eds) Mobile agents and security, LNCS 1419. Springer, Berlin, pp 15\u201324"},{"key":"9228_CR64","unstructured":"Roth V (1998) Secure recording of itineraries through cooperating agents. In: Proceedings of 4th workshop on mobile object systems: secure internet mobile computations. INRIA, France, pp 147\u2013154"},{"key":"9228_CR65","doi-asserted-by":"crossref","unstructured":"Sabater J, Sierra C (2001) REGRET: a reputation model for gregarious societies. In: Proceedings of 4th workshop on deception, fraud and trust in agent societies, Montreal, Canada, pp 61\u201369","DOI":"10.1145\/375735.376110"},{"key":"9228_CR66","doi-asserted-by":"crossref","unstructured":"Sabater J, Sierra C (2002) Reputation and social network analysis in multi-agent systems. In: Proceedings of 1st AAMAS, Bologna, pp 475\u2013482","DOI":"10.1145\/544741.544854"},{"key":"9228_CR67","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J Sabater","year":"2005","unstructured":"Sabater J, Sierra C (2005) Review on computational trust and reputation models. Artif Intell Rev 24: 33\u201360","journal-title":"Artif Intell Rev"},{"key":"9228_CR68","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of security analysis and design, LNCS 2171","author":"P Samarati","year":"2001","unstructured":"Samarati P, De Capitani di Vimercati S (2001) Access control: policies, models, and mechanisms. In: Focardi R, Gorrieri R (eds) Foundations of security analysis and design, LNCS 2171. Springer, Berlin, pp 137\u2013196"},{"issue":"1","key":"9228_CR69","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1145\/234313.234412","volume":"28","author":"R Sandhu","year":"1996","unstructured":"Sandhu R, Samarati P (1996) Authentication, access control, and audit. ACM Comput Surv 28(1): 241\u2013243","journal-title":"ACM Comput Surv"},{"issue":"2","key":"9228_CR70","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R Sandhu","year":"1996","unstructured":"Sandhu R, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2): 38\u201347","journal-title":"Computer"},{"issue":"(8","key":"9228_CR71","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1080\/08839510050127579","volume":"14","author":"M Schillo","year":"2000","unstructured":"Schillo M, Funk P, Rovatsos M (2000) Using trust for detecting deceitful agents in artificial societies. Appl Artif Intell 14((8): 825\u2013848","journal-title":"Appl Artif Intell"},{"key":"9228_CR72","doi-asserted-by":"crossref","unstructured":"Sekar R, Ramakrishnan CR, Ramakrishnan IV, Smolka SA (2001) Model-carrying code (MCC): a new paradigm for moblie-code security. In: Proceedings the new security paradigms workshop (NSPW2001), pp 23\u201330","DOI":"10.1145\/508171.508175"},{"key":"9228_CR73","unstructured":"SeMoA (2007) http:\/\/semoa.sourceforge.net\/"},{"key":"9228_CR74","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-642-03278-3_13","volume-title":"Programming multi-agent systems, LNCS 5442","author":"J Such","year":"2009","unstructured":"Such J, Alberola J, Garcia-Fornes A, Espinosa A, Botti V (2009) Kerberos-based secure multiagent platform. In: Hindriks KV, Pokahr A, Sardina S (eds) Programming multi-agent systems, LNCS 5442. Springer, Berlin, pp 197\u2013210"},{"key":"9228_CR75","doi-asserted-by":"crossref","unstructured":"van\u2019t Noordende GJ, Brazier FMT, Tanenbaum AS (2004) Security in a mobile agent system. In: Proceedings of the 1st IEEE symposium on multi-agent security and survivability, pp 35\u201345","DOI":"10.1109\/MASSUR.2004.1368416"},{"key":"9228_CR76","unstructured":"Vigna G (1997) Protecting mobile agents through tracing. In: Proceedings of the 3rd ECOOP workshop on mobile object systems, Jyv\u00e4lskyl\u00e4"},{"issue":"3","key":"9228_CR77","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/570132.570136","volume":"9","author":"ST Vuong","year":"2001","unstructured":"Vuong ST, Fu P (2001) A security architecture and design for mobile intelligent agent systems. ACM SIGAPP Appl Comput Rev 9(3): 21\u201330","journal-title":"ACM SIGAPP Appl Comput Rev"},{"key":"9228_CR78","unstructured":"Wang Y, Singh MP (2006a) Trust representation and aggregation in a distributed agent system. In: Proceedings of 21st AAAI, pp 1425\u20131430"},{"key":"9228_CR79","unstructured":"Wang Y, Singh MP (2006b) Trust via evidence combination: a mathematical approach based on certainty. TR 2006-11, North Carolina State University, Raleigh"},{"key":"9228_CR80","unstructured":"Wang Y, Singh MP (2007) Formal trust model for multiagent systems. In: Proceedings of the 20th international joint conference on artificial intelligence (IJCAI\u201907), pp 1551\u20131556"},{"key":"9228_CR81","unstructured":"Wang S, Hu J, Liu A, Wang J (2005) Security frame and evaluation in mobile agent system. In: Proceedings of 2nd international conference on mobile technology, applications, and systems, pp 1\u20136"},{"key":"9228_CR82","doi-asserted-by":"crossref","unstructured":"Wangham MS, da Silva Fraga J, Schmidt R, Rabelo RJ (2004) MASS: a mobile agent security scheme for the creation of virtual enterprises. In: Proceedings of the 1st international workshop on mobility aware technologies and applications, pp 234\u2013243","DOI":"10.1007\/978-3-540-30178-3_22"},{"issue":"9","key":"9228_CR83","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1080\/08839510050144877","volume":"14","author":"W Wen","year":"2000","unstructured":"Wen W, Mizoguchi F (2000) An authorization-based trust model for multiagent systems. Appl Artif Intell 14(9): 909\u2013925","journal-title":"Appl Artif Intell"},{"key":"9228_CR84","doi-asserted-by":"crossref","unstructured":"Wilikens M, Feriti S, Sanna A, Masera M (2002) A context-related authorization and access control method based on RBAC. In Proceedings of the 7th ACM symposium on access control models and technologies, pp 117\u2013124","DOI":"10.1145\/507711.507730"},{"key":"9228_CR85","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1017\/S0269888900008122","volume":"10","author":"M Wooldridge","year":"1995","unstructured":"Wooldridge M, Jennings NR (1995) Intelligent agents: theory and practice. Knowl Eng Rev 10: 115\u2013152","journal-title":"Knowl Eng Rev"},{"key":"9228_CR86","doi-asserted-by":"crossref","unstructured":"Young A, Yung M (1997) Sliding encryption: a cryptographic tool for mobile agents. In: Proceedings of the 4th international workshop of fast software encryption, LNCS 1267, pp 230\u2013241","DOI":"10.1007\/BFb0052350"},{"issue":"4","key":"9228_CR87","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1111\/1467-8640.00202","volume":"18","author":"B Yu","year":"2002","unstructured":"Yu B, Singh MP (2002) Distributed reputation management for electronic commerce. Comput Intell 18(4): 535\u2013549","journal-title":"Comput Intell"},{"key":"9228_CR88","doi-asserted-by":"crossref","unstructured":"Yu B, Singh MP (2003) Searching social networks. In: Proceedings 2nd of AAMAS, pp 65\u201372","DOI":"10.1145\/860575.860587"},{"key":"9228_CR89","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1080\/08839510050144868","volume":"14","author":"G Zacharia","year":"2000","unstructured":"Zacharia G, Maes P (2000) Trust through reputation mechanism. Appl Artif Intell 14: 881\u2013907","journal-title":"Appl Artif Intell"},{"key":"9228_CR90","unstructured":"Zhang G, Parashar M (2004) Context-aware dynamic access control for pervasive applications. In: Proceedings of communication networks and distributed systems modeling and simulation conference"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-011-9228-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-011-9228-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-011-9228-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T14:56:48Z","timestamp":1637765808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-011-9228-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,4]]},"references-count":90,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["9228"],"URL":"https:\/\/doi.org\/10.1007\/s10462-011-9228-8","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,4]]}}}