Mouratidis, Haralambos (2004) A security oriented approach in the development of multiagent systems : applied to the management of the health and social care needs of older people in England. PhD thesis, University of Sheffield.
Abstract
Security can play an important role in the development of some multi agent
systems. However, a careful analysis of software development processes indicates
that the definition of security requirements is, usually, considered after the design of
the system. This approach, usually, leads to problems, such as conflicts between
security and functional requirements, which can translate into security
vulnerabilities. As a result, the integration of security issues in agent oriented
software engineering methodologies has been identified as an important issue.
Nevertheless, developers of agent oriented software engineering methodologies have
mainly neglected security engineering and in fact very little evidence has been
reported on work that integrates security issues into the development stages of agent
oriented software engineering methodologies.
This thesis advances the current state of the art In agent oriented software
engineering in many ways. It identifies problems associated with the integration of
security and software engineering and proposes a set of minimum requirements that a
security oriented process should demonstrate. It extends the concepts and the
development process of the Tropos methodology with respect to security to allow
developers, even those with minimum security knowledge, to identify desired
security requirements for their multi agent systems, reason about them, and as a result
develop a system that satisfies its security requirements. In doing so, this research
has developed (1) an analysis technique to enable developers to select amongst
alternative architectural styles using as criteria the security requirements of the
system, (2) a pattern language consisting of security patterns for multi agent systems,
and (3) a scenario-based technique that allows developers to test the reaction of the
system to potential attacks.
The applicability of the approach is demonstrated by employing it in the
development of the electronic single assessment process (eSAP) system, a real-life
case study that provided the initial motivation for this research.
Metadata
Awarding institution: | University of Sheffield |
---|---|
Academic Units: | The University of Sheffield > Faculty of Engineering (Sheffield) > Computer Science (Sheffield) The University of Sheffield > Faculty of Science (Sheffield) > Computer Science (Sheffield) |
Identification Number/EthosID: | uk.bl.ethos.412722 |
Depositing User: | EThOS Import Sheffield |
Date Deposited: | 26 Jan 2017 16:35 |
Last Modified: | 26 Jan 2017 16:35 |
Open Archives Initiative ID (OAI ID): | oai:etheses.whiterose.ac.uk:14864 |
You do not need to contact us to get a copy of this thesis. Please use the 'Download' link(s) above to get a copy.
You can contact us about this thesis. If you need to make a general enquiry, please see the Contact us page.