SlideShare a Scribd company logo
Metamodel for Reputation based Agents System –
Case Study for Electrical Distribution SCADA Design
Guy Guemkam
Laboratoire d’informatique de Paris 6,
75005 Paris-France
guy.guemkam@lip6.fr
Jonathan Blangenois
Faculty of Computer Science
University of Namur
blangenoisj@gmail.com
Christophe Feltus
‡
, Djamel Khadraoui
Public Research Centre Henri Tudor
EE-Team
‡
, Luxembourg
{firstname.name}@tudor.lu
ABSTRACT
SCADA systems are urged to face more and more complex critical
situation and thereby, need to continuously evolve towards
integrated decision making capability driven by fancy reaction
strategy. The current research stream in that field, aims,
accordingly, to foster the smartness of the field equipment and
actuators, which predominately exist under the concept of agents.
Those agents are governed by policies that while dictating the
agent behavior, depending on the agent roles and the context of
evolution, also confer to the latter the latitude to react based on
their own perception of the evolving environment. This agent
ability is referring to as the agent smartness and is strongly
determined by, and depending on, the trust perceived by the agent
of its environment. Actual work related to agents tends to consider
that agents evolve and are organized in systems. There exist some
models for representing how these agents are organized at a high
level, models for representing how they are spread in the
networks, models to represent how they communicate to each
other, and so forth. However, as far as we know, no model exists
that integrates all of the above models. Therefore, we do believe
that such an integrated model could have many advantages like
e.g. to know the impact from the action from one layer to another,
to decide which action on a component has the most important
impact on a set of other components, to identify the most critical
component for an infrastructure, to align the agent system with the
corporate objective and to tailor it accordingly. Therefore, we
have decided to frame an innovative version of ArchiMate® for
the multi-agent purpose with the objective to enrich the agent
society collaborations and, more particularly, the description of
the agent behavior endorsed in the policy component and using a
reputation based trust model to improve the reliability, termed
ARMAN. Our work has been illustrated in the frame of a critical
infrastructure in the field of electrical power distribution which is
a highly sensitive research topic. .1
Categories and Subject Descriptors
H.2.7: Security, Integrity, and Protection
General Terms
Management, Performance, Design, Reliability, Experimentation,
Security, Languages, Theory, Verification.
Keywords
ArchiMate®,
metamodel, reputation, SCADA, multi-agents
system, trust, electricity distribution, critical infrastructure.
‡Enterprise Engineering Team is a collaboration between CRP
Henri Tudor, Radboud University Nijmegen and the University of
Applied Science Arnhem-Nijmegen (http://www.ee-team.eu)
1. INTRODUCTION
Enterprise architecture models are frameworks that allow
representing the information system (IS) of companies in (or on a
set of) schemas called views. Those models have undergone major
improvements during the first decade of the 21st
century and some
significant frameworks have been developed since, such as
ArchiMate® [1] or the Zachman framework [2]. These models are
traditionally structured in layers that correspond to different levels
of the organizations’ IS. The business layer, for instance, models
the concept that exists at the business layer such as the processes,
the actors, their business roles, and so forth and which are
supported or represented by IT application layers. At this
application layer the concepts of the IS that are modeled are the
applications, the databases, or for instance, the application data.
The advantages of these enterprise architecture models are that
they allow improving the connections between the concepts from
each layer and, thereby, allow a better integration and an
enhanced support for the decision making processes. Up to now,
agents represented at the business layers [3][4] have been
considered human actors playing business roles. However, rising
security requirements for the management of heterogeneous and
distributed architecture calls for a rethinking of distribution of the
security procedures in both: human and software autonomous
entities. Although having been handled by human employees for
years, the management of complex systems, nowadays, needs to
be shared with intelligent software items, often perceived being
more adapted to act in critical situations. This statement is
enforced by the characteristic ability of the agent to act
autonomously in open, distributed and heterogeneous
environments, in connection or not with an upper authority.
Acknowledging this situation, we are forced to admit that
software agents are no longer to be considered only as basic
software components deployed to support business activities, but
that they are part of the business actors as well, that they plays
some kind of “business role”, and they perform “business tasks”
accordingly. Since then, acquiring an innovative enterprise
architecture framework to represent the behaviors of such agents
appears fully justified and required by the practitioners, especially
the ones engaged in the management of those critical
infrastructures.
In this paper, we propose to explore ArchiMate® and to redraw its
structure in order to fit with agent software actors’ specificities
and domain constraints. The main focus concerns the design and
the consideration of the policies that are centric concepts related
to the activation of agents’ behaviours. The paper is structured as
follows, after having sighted the related works concerning the
enterprise architecture models in Section II; we review the
reputation base trust that is exploited in the modelling of the agent
smartness in Section II. We model the concept of policy that
represents the engine of the agent modelling framework in Section
IV and in Section V, we explains layer by layer the entire
Reputation based Agents System Metamodel and illustrates its
different components. In Section VI, we present a case study that
illustrates the exploitation of the enhanced ArchiMate® and we
perform real-time simulations in Section VII. Finally, Section VII
concludes the paper.
As we have notice that agent systems are organized in a way
close to the enterprises system, our proposal analyses how an
enterprise architecture model may be slightly reworked and
adapted for MAS. Therefore, we exploit ArchiMate® which has
the following advantages to be supported by the Open Group2
. It
has a large community and proposes a uniform structure to model
enterprise architecture. Another advantage of ArchiMate® is that
it uses referenced existing modelling languages like UML. With
this aspect we think that it is relevant to provide a lean and simple
structure compliant with the new version of UML to model any
MAS. As a conclusion of our state of the art, we acknowledge the
many other models or frameworks that provide solutions to MAS
models and which are compliant or not with other modelling
languages. As far as we know no existing approach provides a
multiple layer view or an integrated view of these layers.
2. METAMODEL FOR REPUTATION
BASED TRUST
The proposed reputation-based trust management scheme is used
to predict the future behaviour of a component in order to
establish trust among agents and hence to improve security in the
system. The goal of using an architecture using a trust Policy
within a metamodel core is to improve the agent assignment
according to his policy. The trust Policy component depicted in
the Figure 1 signifies the lower value that is necessary for agent to
be assign to a role. Moreover according to his role fulfilment, a
reputation score is used to assess this level of trust. Indeed we
consider reputation as a measure that is derived from direct
and/or indirect knowledge of earlier interactions if any, and is
used to access the level of trust an agent puts into another as in
[18]. This trust policy is linked with the behavioural policy.
Indeed these Behaviour and Trust Policy are combined into
Policy. The rest of the metamodel component is explained in the
next section.
Figure 1. Metamodel Core with Trust Policy.
2.1 Policy Concept and Metamodel Core
Our goal in modelling the multi-agent system into architecture
metamodel is to provide system architects and developers tools to
create their own multi-agent system including the notions of
Agents Policy. As explained in Section II, we have selected the
ArchiMate® language to provide a multiple layered view of multi-
agent system using policies.
To create this metamodel, we have realized a specialization of
the original ArchiMate® metamodel for agent architecture. Firstly
2
http://www.opengroup.org/subjectareas/enterprise/archimate
we have redefined the Core of the metamodel (Figure 1) to figure
out the concept of Policy that hosts the behaviour and the trust
decision mechanism. The Core represents the handling of Passive
Structure by Active Structures during the realization of
Behaviours. For the Active Structures and the Behaviour, the
Core differentiates external concepts that represent how the
architecture is being seen by the external concepts (as a Service
provider attainable by an Interface) and the internal concept
which is composed of Structure Elements (Roles, Components)
and linked to a Policy Execution concept. Passive Structures
contain Object (Data Object, Organizational Object, Artefacts,…)
that represents information of the architecture.
Secondly, the concept of Policy has been defined in accordance
with our specialization of the ArchiMate® metamodel. The
proposed representation is composed of three concepts defining
the Policy
2.2 Policy modelling
The organizational and the application policies may, afterwards,
be modelled as follows:
2.2.1 Organizational Policy.
In the Organizational Layer, Organizational Policy can be
represented as an UML Use Case [14] where concepts of Roles
represent the Actors of the Use Case and the Collaboration
concepts show the connections between them. Concepts of
Products, Value and Organizational Service provide the Goal
of the Use Case. Pre and Post conditions are modelling the
context of the Use Case and are symbolized in the metamodel as
the Event concept (Precondition) and the Organizational Object
(Pre/Post condition).
2.2.2 Application Policy.
Application Policy from the Application Layer is defined in
Section III as the realisation of behaviour by the Application
domain in a configuration of the Data domain. UML provides
support to model the behaviour performed by the Application
domain as Sequence Diagram. Configuration of the Data domain
can be expressed as Preconditions of the Sequence Diagram and
symbolized by the execution of a test-method on the lifeline of the
diagram (Figure 2).
Figure 2. Active structure connections
2.2.3 Reputation based Trust Policy
Each agent used reputation to derive the trustworthiness that it
puts in another based on information provided by probes.
Implementation of TRM mechanisms are translated into agent
behaviours through the concept of Policies called Trust Policies.
As it will be later illustrated through the broadcasting mechanism
(Figure 8), the trust value of each component at an upper level, for
instance MSP agents, is derived from sublevels agents. That
signifies that, for two given agents A and B, the trust value of
agent B computed by agents A is calculated using equation 1,
adapted from [18] as such:
TAB=ORAB= γDRAB+ (1-γ)(μ1IRi1B+ μ2IRi2B+μ1IRi3B)
DRAB=E(Beta(α,β)) E=α/α+β
with μ1+μ2+μ2=1 and 0<γ<1
(1)
(2)
DRAB represents the direct reputation of agent B view by agent
A and is obtained through direct interactions using the mean of
the beta distribution calculated from equation 2 extracted from
[18]. IRi1B represents reputation coming from other agent i1 (as
well as i2 and i3) and μ1, μ2 and μ3 represent the trustworthiness of
the associations between each agent. Applying 1 to the
broadcasting mechanism of figure 8, it gives:
TMBP_ACE=
γDRMBP_ACE+(1-γ)(μ1IRi1_ACE+μ2IRi2_ACE+μ1IRi3_ACE)
(3)
with μ1, μ2 and μ3 values calculated based on strategic
broadcasting decision e.g. prioritisation of regional broadcasting
or technology threat mitigation (see Section VII).
3. CASE STUDY IN ELECTRIC POWER
DISTRIBUTION INFRASTRUCTURE
The represent the modelling of MAS with ArchiMate for MAS,
we complete, in this paper, the case study presented in [8]. To
know: electricity is a difficultly storable good. Its production has
to precisely fit with its consumption. To maintain and guarantee
that balance, electric companies supervise the transport of the
electricity and manage the electric network. They keep watching
in real time both production (wind turbine) and consumption
(electric warmer) values to maintain the safety of the system. In
case of productivity problem, solutions are deployed like the
importation of electricity from adjoining countries or user
request, made via TV and newspapers, to adapt the usage of
electric machines (e.g. stop washing machine or dryer).
The broadcasting mechanism (Figure 4) aims at sending alerts
to the population using media such as the SMS or tweets
whenever a weather alert occurs. This section presents the core
components of the broadcasting mechanism. The solution relies
on a MAS technology on the top of the JADE framework [6].
Agents are disseminated on three layers of the infrastructure
corresponding to geographical region (city, region or country) and
they retrieve information from probes located in weather station
and on the electric networks and representing with different
values: pressure, temperature and electric voltage.
The agents that compose the critical architecture are the
following:
The Alert Correlation Engine (ACE) collect, aggregates and
analyses weather information coming from probes deployed over
the network and weather stations. Confirmed alerts are sent to the
Policy Instantiation Engine (PIE). The PIE receives confirmed
alert from the ACE, set the severity level and the extent of the
geographical response. The PIE instantiates high level alert
messages, to be deployed. Finally the high level alert messages are
transferred to the Message Supervising Point (MSP). The MSP, as
explained in detailed in [9] is composed of two modules. The
Policy Analysis (PA) is in charge of analysing the policies
previously instantiated by the PIE. For that, the Policy Status
database stores all communication policies and their current status
(in progress, not applicable, by-passed, enforced, removed…) so
that the PA module can check the consistency of the newly
received message to be deployed. The second module is the
Component Configuration Mapper that selects the appropriate
communication channel.
Figure 3 presents two different kinds of Message Broadcasting
Point (MBP). Indeed, another advantage of MAS is that it is easy
to implement from a model, specific agents in order to perform
specific tasks. Concretely it enables us to use different channel of
communication (e.g. SMS, e-mail, micro-blogging) to send alerts
to citizens, hospitals, etc. By this way our electric blackout
prevention system is easily extensible for future communications
facilities. MBPs receive generic alert messages from the MSP.
Then a specific parser converts the incoming alert message to the
appropriate format according to the channel.
Figure 3. MBP architecture
To consider the mutual trust between agents, each agent
maintains within it a database of levels of trust towards its pairs.
This means e.g. that the MBP has a dedicated level of trust for the
ACE and the MSP.
The broadcasting alert architecture presented in this section is
based on the ReD project [7]. The ReD (Reaction after Detection)
project defines and designs a solution to enhance the
detection/reaction process and improves the overall resilience of
critical infrastructures. Figure 10 introduces the developed
architecture illustrated with our weather broadcast alert system.
The flow is supposed to begin with an alert detected by a probe.
Figure 4. Broadcasting mechanism inside
This alert is send to the ACE agent (City layer) that does or
does not confirm the alert to the PIE. Afterwards, the PIE decides
to apply new policies or to forward the alert to an ACE from a
higher layer (Region Layer). The PIE agent sends the policies to
the MSP agent, which decides which MBP is able to transform the
high level alert message into an understandable format for the
selected communication channel.
In order to manage access rights, we have incorporated to ReD
a Context Rights Management module (CRM). Block on the right
on Figure 10. The CRM is in charge of providing access rights to
agents (E.g. MBP to the probes and Logs File database, MSP to
the Policy Rules Status database). The CRM uses the agent links
and the crisis context database. The first database includes the link
between two agents (type of contextual access right). The second
database includes a set of crisis contexts. Thanks to these
databases the CRM agent is able to detect the agent right to access
each other’s at the operational layer depending on the context.
3.1 ACE Organizational layer
In the Organizational layer of the ACE Agent (Figure 11) we have
represented separately the monitoring aspect from the transaction
aspect. We call a transaction a communication of information
from one agent to another (e.g. the ACE sends an alert to a PIE)
and then we consider the monitoring as the representation of
information from an external device. Firstly the Organizational
Role of the ACE is represented as a Collaboration of the PIE Role
and the Device Role.
Figure 5. Detailed reaction architecture for electricity
distribution adaptation based on weather parameters
Each Role of the Collaboration communicates with the ACE
through a proper Organizational Interface one for the monitoring
and another one for the transaction. ACE Role is providing two
Organizational Services depending on only one Organizational
Policy which is dealing with two Events respectively for the
monitoring and the transaction. Secondly the two Organizational
Services provided by the ACE agent are regrouped into a
correlation service symbolized by the Product concept. This
Product has the objective Value to reduce a crisis by giving a
guaranty of short reaction time represented by the Contract
concept. Finally the Contract is applied on Organizational Object
as monitoring information and transaction information.
3.2 ACE Application layer
For the Application layer of the ACE Agent (Figure 11) we found
the separation between the transaction and the monitoring.
Application Services for transactions and monitoring are, as in the
Organizational Policy, linked to only one Application Policy. To
highlight the collaboration between the ACE and the Monitored
Device, we created a Collaboration concept named Monitoring
Administration and shows that this collaboration is constituted of
the Components of the ACE and the Components of the Device.
Device’s components use the Application Monitoring Interface to
communicate with the ACE’s components and the ACE’s
components are composed of the Application Monitoring
Interface.
We use the same approach for the transaction part and rapidly
show that the ACE’s components are composed of two interfaces
deserving the two Application Services. Again the Application
layer contains Data Object as Transaction Messages and
Monitoring Messages used by the different Application
Components of the layer.
Figure 6. ACE agent model
3.3 ACE Technical layer
We found in the Technical layer of the ACE Agent (Figure 11)
another representation of the two collaborators of the ACE agent.
Transaction and Monitoring Infrastructure are separated from
each other. Both of them have Infrastructure Service connected to
the ACE agent’s Node and an Infrastructure Interface where the
collaborators can interact with it. Each Node is respectively
connected to a Communication Path (represented by a logical
Event Queuing) and uses different Artifacts to communicate. We
have intentionally not instantiated Nodes for readability but the
reader can easily imagine that an ACE agent can be deployed on a
computer who’s running an operating system. Also the Network
concept is not defined in our instantiation for the same reason. For
example Monitoring Event Queue between the ACE agent and the
Device can be represented as a Network concept, as an USB cable
and for the Transaction Event Queue by an RJ45 cable.
3.4 ACE Organizational Policy
To illustrate the Organizational Policies of the ACE we choose to
represent the monitoring part of the ACE Role as an UML Use
Case (Figure 12). Monitoring Events are illustrated in the Use
Case as Extension Points and show their impacts on the
behaviours realized in the Perform Monitoring Policy. Roles are
presented as Actors and Collaborations are highlighted by the
different link between the behaviours.
Figure 7. ACE Monitoring Organizational Policies Use Case
3.5 ACE Application Policy
Sequences Diagrams have been used to represent the behaviours
performed by the Application Domain of the ACE Agent for the
Application Policy: Perform Detection (Figure 13).
In the Sequence Diagram, behaviour of each component is fit
to his lifeline and in/out Events presented as inter-component
methods call. Context analyse is performed by the component
during the execution of his behaviour.
Figure 8. Perform Detection – High level Sequence Diagram
4. SIMULATIONS
In this paragraph we have simulated a heterogeneous network of
ACE and PIE (Figure 14) agents running the reputation model in
[9]. The framework used for the test environment has been
developed in JAVA and simulate MAS network in a graphical
environment. Each created agent is deployed on thread and is only
connected to a central supervisor (Composed of an Agent
Manager and a Graph Supervisor) that give him the list of his
neighbors depending of his location on the network with a
maximum edge size between agents. The protocol used asks ACE
agents to send a message containing the collected data from the
probe to the nearest PIE every five seconds. Test environment
represents a city of 50x50km with a maximum of 5 kilometers
connection distance between agents. Also simulations have been
running several times during 120 seconds with different load of
malicious agents, respectively 10%, 50% and 90%.
Figure 9. Simulation network
For each load of malicious agents in the network we have
collected the trust table - equation 3 (section IV.3) - of the same
PIE agent, representing his perception of his neighbors ACE
(Table I.)
Table I. PIE perception evolution
10% 50% 90%
ACE Rep ACE Rep ACE Rep
A73 0.8 A73 0.75 A73 0.62
A71 0.86 A71 0.87 A71 0.81
A80 0.69 A80 0.55 A80 0.15
A45 0.72 A45 0.98 A45 0.76
A55 0.91 A55 0.93 A55 0.9
A56 0.93 A56 0.0 A56 0.36
A66 0.82 A66 0.85 A66 0.72
A32 0.8 A32 0.81 A32 0.44
A35 0.84 A35 0.92 A35 0.99
A0 0.73 A0 0.71 A0 0.66
As the percentage of malicious growth, the threshold evolves
according to the reputation. For instance, the reputation of PIE
“A35” growth from 0.84 to 0.99 as the percentage of malicious
PIE grows from 10% to 90%.
5. CONCLUSIONS AND FUTURE WORKS
We have elaborated a an innovative version of ArchiMate® for
MAS purpose to enrich the agent society collaborations and, more
particularly, the description of the agent behavior endorsed in the
policy component and using a reputation based trust model
termed ARMAN. To illustrate our work, a case study has been
performed in the frame of a critical infrastructure related to
electrical power distribution. This case study has allowed
illustrating and validating the definition of policies according to
reaction strategy on the first hand, and depending on evolving
trust parameters amongst agents on the other hand. Finally, we
have simulated a heterogeneous network of ACE and PIE agents
running the reputation model and where different load of
malicious agents have been integrated.
As future works, additional validations are expected in the next
months on larger scale infrastructures. In parallel, a supporting
tool is being developed. The upper validation has been allowed by
the primary functionalities of it. Additional features of that latter
will allow modulating the environment parameters in which the
agents’ network is running and thereby, it will allow refining and
validating the trust based policies evolution along more complex
situations.
6. ACKNOWLEDGEMENTS
This research is supported and funded by the European FP7-
Security project “CockpiCI”, Cybersecurity on SCADA: risk
prediction, analysis and reaction tools for Critical Infrastructures.
7. REFERENCES
[1] M. Lankhorst. ArchiMate language primer, 2004.
[2] J. A. Zachman. 2003. The Zachman Framework For Enterprise
Architecture : Primer for Enterprise Engineering and Manufacturing
By. Engineering, no. July: 1-11.
[3] F. Zambonelli, N. R. Jennings, and M. Wooldridge. 2003.
Developing multiagent systems: The Gaia methodology. ACM
Trans. Softw. Eng. Methodol. 12, 3 (July 2003), 317-370.
[4] V.Torres da Silva, R. Choren, and C. J. P. de Lucena. 2004. A UML
Based Approach for Modeling and Implementing Multi-Agent
Systems. In Proceedings of the Third International Joint Conference
on Autonomous Agents and Multiagent Systems - (AAMAS '04),
Vol. 2. IEEE Computer Society, Washington, DC, USA, 914-921.
[5] G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. Gâteau, D.
Khadraoui, Z. Guessoum, Financial Critical Infrastructure: A MAS
Trusted Architecture for Alert Detection and Authenticated
Transactions, Sixth IEEE Conference on Network Architecture and
Information System Security (IEEE SAR/SSI2011), France
[6] G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, D. Khadraoui,
Z. Guessoum, Reputation based Dynamic Responsibility to Agent
for Critical Infrastructure, IEEE/WIC/ACM International
Conference on Intelligent Agent Technology, 2011, Lyon, France.
[7]
[8]
[9] C. Hahn. 2008. A domain specific modeling language for multiagent
systems. In Proceedings of the 7th international joint conference on
Autonomous agents and multiagent systems - (AAMAS '08), Vol. 1.
International Foundation for Autonomous Agents and Multiagent
Systems, Richland, SC, 233-240.
[10] AUML (Agent UML), http://www.auml.org/
[11] Prometheus Methodology.
http://www.cs.rmit.edu.au/agents/SAC2/methodology.html
[12]
[13] M. Lankhorst. ArchiMate language primer, 2004.
[14] J. A. Zachman. 2003. The Zachman Framework For Enterprise
Architecture : Primer for Enterprise Engineering and Manufacturing
By. Engineering, no. July: 1-11.
[15]
[16] UML 2 ( http://www.uml.org/)
.
[17]
[18] .
[19] G. Guemkam, D. Khadraoui, B. Gâteau, Z. Guessoum, ARMAN:
Agent-based Reputation for Mobile Ad hoc Networks. 11th
Conference on Practical Applications of Agents and Multi-Agent
Systems. Salamanca, Spain 22nd-24 May 2013.
J. Blangenois, G. Guemkam, C. Feltus, D. Khadraoui,
Organizational Security Architecture for Critical Infrastructure,
8th International Workshop on Frontiers in Availability, FARES
2013, an International Workshop of the eight International
Conference ARES.

More Related Content

What's hot

Building a responsibility model using modal logic
Building a responsibility model using modal logicBuilding a responsibility model using modal logic
Building a responsibility model using modal logic
Luxembourg Institute of Science and Technology
 
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
Editor IJCATR
 
Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...
Luxembourg Institute of Science and Technology
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
Luxembourg Institute of Science and Technology
 
Ch09
Ch09Ch09
Lectura 2.1 architectural integrationstylesfor largescale-editable_pdf
Lectura 2.1   architectural integrationstylesfor largescale-editable_pdfLectura 2.1   architectural integrationstylesfor largescale-editable_pdf
Lectura 2.1 architectural integrationstylesfor largescale-editable_pdf
Matias Menendez
 
Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...
Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...
Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...
IJERA Editor
 
Jobst Landgrebe The HL7 Services Aware Interoperability Framework (SAIF)
Jobst Landgrebe The HL7 Services Aware Interoperability Framework (SAIF)Jobst Landgrebe The HL7 Services Aware Interoperability Framework (SAIF)
Jobst Landgrebe The HL7 Services Aware Interoperability Framework (SAIF)
Barry Smith
 
Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...
Luxembourg Institute of Science and Technology
 
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMSDEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
International Journal of Technical Research & Application
 
A Framework for Engineering Enterprise Agility
A Framework for Engineering Enterprise AgilityA Framework for Engineering Enterprise Agility
A Framework for Engineering Enterprise Agility
rahmanmokhtar
 
Daneva wieringa-camera-ready-re-paper
Daneva wieringa-camera-ready-re-paperDaneva wieringa-camera-ready-re-paper
Daneva wieringa-camera-ready-re-paper
Manuel Oliveira
 
Intelligent Buildings: Foundation for Intelligent Physical Agents
Intelligent Buildings: Foundation for Intelligent Physical AgentsIntelligent Buildings: Foundation for Intelligent Physical Agents
Intelligent Buildings: Foundation for Intelligent Physical Agents
IJERA Editor
 
81-T48
81-T4881-T48

What's hot (14)

Building a responsibility model using modal logic
Building a responsibility model using modal logicBuilding a responsibility model using modal logic
Building a responsibility model using modal logic
 
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
 
Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
 
Ch09
Ch09Ch09
Ch09
 
Lectura 2.1 architectural integrationstylesfor largescale-editable_pdf
Lectura 2.1   architectural integrationstylesfor largescale-editable_pdfLectura 2.1   architectural integrationstylesfor largescale-editable_pdf
Lectura 2.1 architectural integrationstylesfor largescale-editable_pdf
 
Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...
Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...
Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...
 
Jobst Landgrebe The HL7 Services Aware Interoperability Framework (SAIF)
Jobst Landgrebe The HL7 Services Aware Interoperability Framework (SAIF)Jobst Landgrebe The HL7 Services Aware Interoperability Framework (SAIF)
Jobst Landgrebe The HL7 Services Aware Interoperability Framework (SAIF)
 
Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...
 
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMSDEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
DEVELOPMENT OF A MULTIAGENT BASED METHODOLOGY FOR COMPLEX SYSTEMS
 
A Framework for Engineering Enterprise Agility
A Framework for Engineering Enterprise AgilityA Framework for Engineering Enterprise Agility
A Framework for Engineering Enterprise Agility
 
Daneva wieringa-camera-ready-re-paper
Daneva wieringa-camera-ready-re-paperDaneva wieringa-camera-ready-re-paper
Daneva wieringa-camera-ready-re-paper
 
Intelligent Buildings: Foundation for Intelligent Physical Agents
Intelligent Buildings: Foundation for Intelligent Physical AgentsIntelligent Buildings: Foundation for Intelligent Physical Agents
Intelligent Buildings: Foundation for Intelligent Physical Agents
 
81-T48
81-T4881-T48
81-T48
 

Viewers also liked

Alternating Current Machines-Synchronous Machines
Alternating Current Machines-Synchronous MachinesAlternating Current Machines-Synchronous Machines
Alternating Current Machines-Synchronous Machines
Talia Carbis
 
Magneto-optic-current-transformer
Magneto-optic-current-transformerMagneto-optic-current-transformer
Magneto-optic-current-transformer
Sushovan Bej
 
Principles of Special Motors
Principles of Special MotorsPrinciples of Special Motors
Principles of Special Motors
Naila Syed
 
high voltage step-up dc-dc converter with coupled inductor
high voltage step-up dc-dc converter with coupled inductorhigh voltage step-up dc-dc converter with coupled inductor
high voltage step-up dc-dc converter with coupled inductor
vangapandusantoshkumar
 
MOCT
MOCTMOCT
Digital testing of high voltage circuit breaker
Digital testing of high voltage circuit breakerDigital testing of high voltage circuit breaker
Digital testing of high voltage circuit breaker
neeraj prasad
 
transformer ppt
transformer ppttransformer ppt
transformer ppt
Sharukh Ansari
 

Viewers also liked (7)

Alternating Current Machines-Synchronous Machines
Alternating Current Machines-Synchronous MachinesAlternating Current Machines-Synchronous Machines
Alternating Current Machines-Synchronous Machines
 
Magneto-optic-current-transformer
Magneto-optic-current-transformerMagneto-optic-current-transformer
Magneto-optic-current-transformer
 
Principles of Special Motors
Principles of Special MotorsPrinciples of Special Motors
Principles of Special Motors
 
high voltage step-up dc-dc converter with coupled inductor
high voltage step-up dc-dc converter with coupled inductorhigh voltage step-up dc-dc converter with coupled inductor
high voltage step-up dc-dc converter with coupled inductor
 
MOCT
MOCTMOCT
MOCT
 
Digital testing of high voltage circuit breaker
Digital testing of high voltage circuit breakerDigital testing of high voltage circuit breaker
Digital testing of high voltage circuit breaker
 
transformer ppt
transformer ppttransformer ppt
transformer ppt
 

Similar to Metamodel for reputation based agents system – case study for electrical distribution scada design

Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxRunning head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
jeanettehully
 
10.1.1.107.2618
10.1.1.107.261810.1.1.107.2618
10.1.1.107.2618
Jay van Zyl
 
Enhancing the archmate® standard with a responsibility modeling language for ...
Enhancing the archmate® standard with a responsibility modeling language for ...Enhancing the archmate® standard with a responsibility modeling language for ...
Enhancing the archmate® standard with a responsibility modeling language for ...
christophefeltus
 
Enhancing the archimate® standard with a responsibility modeling language for...
Enhancing the archimate® standard with a responsibility modeling language for...Enhancing the archimate® standard with a responsibility modeling language for...
Enhancing the archimate® standard with a responsibility modeling language for...
Luxembourg Institute of Science and Technology
 
J017325660
J017325660J017325660
J017325660
IOSR Journals
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
iosrjce
 
Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...
Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...
Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...
Iver Band
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
Jennifer Wood
 
Building an Information System
Building an Information SystemBuilding an Information System
Building an Information System
Jo Balucanag - Bitonio
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft Mimarisi
Nuri Cankaya
 
Asset Management Web Application
Asset Management Web ApplicationAsset Management Web Application
Asset Management Web Application
IJERD Editor
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
Jeff Nelson
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
IJECEIAES
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
Shashank Srivastava
 
Software requirement analysis enhancements byprioritizing re
Software requirement analysis enhancements byprioritizing reSoftware requirement analysis enhancements byprioritizing re
Software requirement analysis enhancements byprioritizing re
AlleneMcclendon878
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
IRJET Journal
 
Software engineering Questions and Answers
Software engineering Questions and AnswersSoftware engineering Questions and Answers
Software engineering Questions and Answers
Bala Ganesh
 
Dynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the GridDynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the Grid
Editor IJCATR
 
40
4040
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
IJAAS Team
 

Similar to Metamodel for reputation based agents system – case study for electrical distribution scada design (20)

Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxRunning head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
 
10.1.1.107.2618
10.1.1.107.261810.1.1.107.2618
10.1.1.107.2618
 
Enhancing the archmate® standard with a responsibility modeling language for ...
Enhancing the archmate® standard with a responsibility modeling language for ...Enhancing the archmate® standard with a responsibility modeling language for ...
Enhancing the archmate® standard with a responsibility modeling language for ...
 
Enhancing the archimate® standard with a responsibility modeling language for...
Enhancing the archimate® standard with a responsibility modeling language for...Enhancing the archimate® standard with a responsibility modeling language for...
Enhancing the archimate® standard with a responsibility modeling language for...
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...
Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...
Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
Building an Information System
Building an Information SystemBuilding an Information System
Building an Information System
 
Microsoft Mimarisi
Microsoft MimarisiMicrosoft Mimarisi
Microsoft Mimarisi
 
Asset Management Web Application
Asset Management Web ApplicationAsset Management Web Application
Asset Management Web Application
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Software requirement analysis enhancements byprioritizing re
Software requirement analysis enhancements byprioritizing reSoftware requirement analysis enhancements byprioritizing re
Software requirement analysis enhancements byprioritizing re
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
 
Software engineering Questions and Answers
Software engineering Questions and AnswersSoftware engineering Questions and Answers
Software engineering Questions and Answers
 
Dynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the GridDynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the Grid
 
40
4040
40
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 

More from Luxembourg Institute of Science and Technology

Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-TopicsSmart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Luxembourg Institute of Science and Technology
 
Joint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forumJoint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forum
Luxembourg Institute of Science and Technology
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Luxembourg Institute of Science and Technology
 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate language
Luxembourg Institute of Science and Technology
 
Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...
Luxembourg Institute of Science and Technology
 
Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...
Luxembourg Institute of Science and Technology
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
Luxembourg Institute of Science and Technology
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...
Luxembourg Institute of Science and Technology
 
Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...
Luxembourg Institute of Science and Technology
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Luxembourg Institute of Science and Technology
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
Luxembourg Institute of Science and Technology
 
Service specification and service compliance how to consider the responsibil...
Service specification and service compliance  how to consider the responsibil...Service specification and service compliance  how to consider the responsibil...
Service specification and service compliance how to consider the responsibil...
Luxembourg Institute of Science and Technology
 
Responsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e governmentResponsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e government
Luxembourg Institute of Science and Technology
 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...
Luxembourg Institute of Science and Technology
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...
Luxembourg Institute of Science and Technology
 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methods
Luxembourg Institute of Science and Technology
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
Luxembourg Institute of Science and Technology
 
On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...
Luxembourg Institute of Science and Technology
 
Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...
Luxembourg Institute of Science and Technology
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
Luxembourg Institute of Science and Technology
 

More from Luxembourg Institute of Science and Technology (20)

Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-TopicsSmart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
 
Joint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forumJoint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forum
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate language
 
Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...
 
Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...
 
Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Service specification and service compliance how to consider the responsibil...
Service specification and service compliance  how to consider the responsibil...Service specification and service compliance  how to consider the responsibil...
Service specification and service compliance how to consider the responsibil...
 
Responsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e governmentResponsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e government
 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...
 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methods
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
 
On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...
 
Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 

Recently uploaded

Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)
Sciences of Europe
 
The binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defectsThe binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defects
Sérgio Sacani
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
Carl Bergstrom
 
Medical Orthopedic PowerPoint Templates.pptx
Medical Orthopedic PowerPoint Templates.pptxMedical Orthopedic PowerPoint Templates.pptx
Medical Orthopedic PowerPoint Templates.pptx
terusbelajar5
 
Equivariant neural networks and representation theory
Equivariant neural networks and representation theoryEquivariant neural networks and representation theory
Equivariant neural networks and representation theory
Daniel Tubbenhauer
 
aziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobelaziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobel
İsa Badur
 
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdfTopic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
TinyAnderson
 
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
hozt8xgk
 
The debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically youngThe debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically young
Sérgio Sacani
 
Eukaryotic Transcription Presentation.pptx
Eukaryotic Transcription Presentation.pptxEukaryotic Transcription Presentation.pptx
Eukaryotic Transcription Presentation.pptx
RitabrataSarkar3
 
THEMATIC APPERCEPTION TEST(TAT) cognitive abilities, creativity, and critic...
THEMATIC  APPERCEPTION  TEST(TAT) cognitive abilities, creativity, and critic...THEMATIC  APPERCEPTION  TEST(TAT) cognitive abilities, creativity, and critic...
THEMATIC APPERCEPTION TEST(TAT) cognitive abilities, creativity, and critic...
Abdul Wali Khan University Mardan,kP,Pakistan
 
Compexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titrationCompexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titration
Vandana Devesh Sharma
 
Basics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different formsBasics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different forms
MaheshaNanjegowda
 
Unlocking the mysteries of reproduction: Exploring fecundity and gonadosomati...
Unlocking the mysteries of reproduction: Exploring fecundity and gonadosomati...Unlocking the mysteries of reproduction: Exploring fecundity and gonadosomati...
Unlocking the mysteries of reproduction: Exploring fecundity and gonadosomati...
AbdullaAlAsif1
 
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptxThe use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
MAGOTI ERNEST
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
PRIYANKA PATEL
 
Oedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptxOedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptx
muralinath2
 
NuGOweek 2024 Ghent programme overview flyer
NuGOweek 2024 Ghent programme overview flyerNuGOweek 2024 Ghent programme overview flyer
NuGOweek 2024 Ghent programme overview flyer
pablovgd
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
IshaGoswami9
 
Applied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdfApplied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdf
University of Hertfordshire
 

Recently uploaded (20)

Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)
 
The binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defectsThe binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defects
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
 
Medical Orthopedic PowerPoint Templates.pptx
Medical Orthopedic PowerPoint Templates.pptxMedical Orthopedic PowerPoint Templates.pptx
Medical Orthopedic PowerPoint Templates.pptx
 
Equivariant neural networks and representation theory
Equivariant neural networks and representation theoryEquivariant neural networks and representation theory
Equivariant neural networks and representation theory
 
aziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobelaziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobel
 
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdfTopic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
 
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
 
The debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically youngThe debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically young
 
Eukaryotic Transcription Presentation.pptx
Eukaryotic Transcription Presentation.pptxEukaryotic Transcription Presentation.pptx
Eukaryotic Transcription Presentation.pptx
 
THEMATIC APPERCEPTION TEST(TAT) cognitive abilities, creativity, and critic...
THEMATIC  APPERCEPTION  TEST(TAT) cognitive abilities, creativity, and critic...THEMATIC  APPERCEPTION  TEST(TAT) cognitive abilities, creativity, and critic...
THEMATIC APPERCEPTION TEST(TAT) cognitive abilities, creativity, and critic...
 
Compexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titrationCompexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titration
 
Basics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different formsBasics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different forms
 
Unlocking the mysteries of reproduction: Exploring fecundity and gonadosomati...
Unlocking the mysteries of reproduction: Exploring fecundity and gonadosomati...Unlocking the mysteries of reproduction: Exploring fecundity and gonadosomati...
Unlocking the mysteries of reproduction: Exploring fecundity and gonadosomati...
 
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptxThe use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptx
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
 
Oedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptxOedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptx
 
NuGOweek 2024 Ghent programme overview flyer
NuGOweek 2024 Ghent programme overview flyerNuGOweek 2024 Ghent programme overview flyer
NuGOweek 2024 Ghent programme overview flyer
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
 
Applied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdfApplied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdf
 

Metamodel for reputation based agents system – case study for electrical distribution scada design

  • 1. Metamodel for Reputation based Agents System – Case Study for Electrical Distribution SCADA Design Guy Guemkam Laboratoire d’informatique de Paris 6, 75005 Paris-France guy.guemkam@lip6.fr Jonathan Blangenois Faculty of Computer Science University of Namur blangenoisj@gmail.com Christophe Feltus ‡ , Djamel Khadraoui Public Research Centre Henri Tudor EE-Team ‡ , Luxembourg {firstname.name}@tudor.lu ABSTRACT SCADA systems are urged to face more and more complex critical situation and thereby, need to continuously evolve towards integrated decision making capability driven by fancy reaction strategy. The current research stream in that field, aims, accordingly, to foster the smartness of the field equipment and actuators, which predominately exist under the concept of agents. Those agents are governed by policies that while dictating the agent behavior, depending on the agent roles and the context of evolution, also confer to the latter the latitude to react based on their own perception of the evolving environment. This agent ability is referring to as the agent smartness and is strongly determined by, and depending on, the trust perceived by the agent of its environment. Actual work related to agents tends to consider that agents evolve and are organized in systems. There exist some models for representing how these agents are organized at a high level, models for representing how they are spread in the networks, models to represent how they communicate to each other, and so forth. However, as far as we know, no model exists that integrates all of the above models. Therefore, we do believe that such an integrated model could have many advantages like e.g. to know the impact from the action from one layer to another, to decide which action on a component has the most important impact on a set of other components, to identify the most critical component for an infrastructure, to align the agent system with the corporate objective and to tailor it accordingly. Therefore, we have decided to frame an innovative version of ArchiMate® for the multi-agent purpose with the objective to enrich the agent society collaborations and, more particularly, the description of the agent behavior endorsed in the policy component and using a reputation based trust model to improve the reliability, termed ARMAN. Our work has been illustrated in the frame of a critical infrastructure in the field of electrical power distribution which is a highly sensitive research topic. .1 Categories and Subject Descriptors H.2.7: Security, Integrity, and Protection General Terms Management, Performance, Design, Reliability, Experimentation, Security, Languages, Theory, Verification. Keywords ArchiMate®, metamodel, reputation, SCADA, multi-agents system, trust, electricity distribution, critical infrastructure. ‡Enterprise Engineering Team is a collaboration between CRP Henri Tudor, Radboud University Nijmegen and the University of Applied Science Arnhem-Nijmegen (http://www.ee-team.eu) 1. INTRODUCTION Enterprise architecture models are frameworks that allow representing the information system (IS) of companies in (or on a set of) schemas called views. Those models have undergone major improvements during the first decade of the 21st century and some significant frameworks have been developed since, such as ArchiMate® [1] or the Zachman framework [2]. These models are traditionally structured in layers that correspond to different levels of the organizations’ IS. The business layer, for instance, models the concept that exists at the business layer such as the processes, the actors, their business roles, and so forth and which are supported or represented by IT application layers. At this application layer the concepts of the IS that are modeled are the applications, the databases, or for instance, the application data. The advantages of these enterprise architecture models are that they allow improving the connections between the concepts from each layer and, thereby, allow a better integration and an enhanced support for the decision making processes. Up to now, agents represented at the business layers [3][4] have been considered human actors playing business roles. However, rising security requirements for the management of heterogeneous and distributed architecture calls for a rethinking of distribution of the security procedures in both: human and software autonomous entities. Although having been handled by human employees for years, the management of complex systems, nowadays, needs to be shared with intelligent software items, often perceived being more adapted to act in critical situations. This statement is enforced by the characteristic ability of the agent to act autonomously in open, distributed and heterogeneous environments, in connection or not with an upper authority. Acknowledging this situation, we are forced to admit that software agents are no longer to be considered only as basic software components deployed to support business activities, but that they are part of the business actors as well, that they plays some kind of “business role”, and they perform “business tasks” accordingly. Since then, acquiring an innovative enterprise architecture framework to represent the behaviors of such agents appears fully justified and required by the practitioners, especially the ones engaged in the management of those critical infrastructures. In this paper, we propose to explore ArchiMate® and to redraw its structure in order to fit with agent software actors’ specificities and domain constraints. The main focus concerns the design and the consideration of the policies that are centric concepts related to the activation of agents’ behaviours. The paper is structured as follows, after having sighted the related works concerning the enterprise architecture models in Section II; we review the reputation base trust that is exploited in the modelling of the agent smartness in Section II. We model the concept of policy that represents the engine of the agent modelling framework in Section
  • 2. IV and in Section V, we explains layer by layer the entire Reputation based Agents System Metamodel and illustrates its different components. In Section VI, we present a case study that illustrates the exploitation of the enhanced ArchiMate® and we perform real-time simulations in Section VII. Finally, Section VII concludes the paper. As we have notice that agent systems are organized in a way close to the enterprises system, our proposal analyses how an enterprise architecture model may be slightly reworked and adapted for MAS. Therefore, we exploit ArchiMate® which has the following advantages to be supported by the Open Group2 . It has a large community and proposes a uniform structure to model enterprise architecture. Another advantage of ArchiMate® is that it uses referenced existing modelling languages like UML. With this aspect we think that it is relevant to provide a lean and simple structure compliant with the new version of UML to model any MAS. As a conclusion of our state of the art, we acknowledge the many other models or frameworks that provide solutions to MAS models and which are compliant or not with other modelling languages. As far as we know no existing approach provides a multiple layer view or an integrated view of these layers. 2. METAMODEL FOR REPUTATION BASED TRUST The proposed reputation-based trust management scheme is used to predict the future behaviour of a component in order to establish trust among agents and hence to improve security in the system. The goal of using an architecture using a trust Policy within a metamodel core is to improve the agent assignment according to his policy. The trust Policy component depicted in the Figure 1 signifies the lower value that is necessary for agent to be assign to a role. Moreover according to his role fulfilment, a reputation score is used to assess this level of trust. Indeed we consider reputation as a measure that is derived from direct and/or indirect knowledge of earlier interactions if any, and is used to access the level of trust an agent puts into another as in [18]. This trust policy is linked with the behavioural policy. Indeed these Behaviour and Trust Policy are combined into Policy. The rest of the metamodel component is explained in the next section. Figure 1. Metamodel Core with Trust Policy. 2.1 Policy Concept and Metamodel Core Our goal in modelling the multi-agent system into architecture metamodel is to provide system architects and developers tools to create their own multi-agent system including the notions of Agents Policy. As explained in Section II, we have selected the ArchiMate® language to provide a multiple layered view of multi- agent system using policies. To create this metamodel, we have realized a specialization of the original ArchiMate® metamodel for agent architecture. Firstly 2 http://www.opengroup.org/subjectareas/enterprise/archimate we have redefined the Core of the metamodel (Figure 1) to figure out the concept of Policy that hosts the behaviour and the trust decision mechanism. The Core represents the handling of Passive Structure by Active Structures during the realization of Behaviours. For the Active Structures and the Behaviour, the Core differentiates external concepts that represent how the architecture is being seen by the external concepts (as a Service provider attainable by an Interface) and the internal concept which is composed of Structure Elements (Roles, Components) and linked to a Policy Execution concept. Passive Structures contain Object (Data Object, Organizational Object, Artefacts,…) that represents information of the architecture. Secondly, the concept of Policy has been defined in accordance with our specialization of the ArchiMate® metamodel. The proposed representation is composed of three concepts defining the Policy 2.2 Policy modelling The organizational and the application policies may, afterwards, be modelled as follows: 2.2.1 Organizational Policy. In the Organizational Layer, Organizational Policy can be represented as an UML Use Case [14] where concepts of Roles represent the Actors of the Use Case and the Collaboration concepts show the connections between them. Concepts of Products, Value and Organizational Service provide the Goal of the Use Case. Pre and Post conditions are modelling the context of the Use Case and are symbolized in the metamodel as the Event concept (Precondition) and the Organizational Object (Pre/Post condition). 2.2.2 Application Policy. Application Policy from the Application Layer is defined in Section III as the realisation of behaviour by the Application domain in a configuration of the Data domain. UML provides support to model the behaviour performed by the Application domain as Sequence Diagram. Configuration of the Data domain can be expressed as Preconditions of the Sequence Diagram and symbolized by the execution of a test-method on the lifeline of the diagram (Figure 2). Figure 2. Active structure connections 2.2.3 Reputation based Trust Policy Each agent used reputation to derive the trustworthiness that it puts in another based on information provided by probes. Implementation of TRM mechanisms are translated into agent behaviours through the concept of Policies called Trust Policies. As it will be later illustrated through the broadcasting mechanism (Figure 8), the trust value of each component at an upper level, for instance MSP agents, is derived from sublevels agents. That signifies that, for two given agents A and B, the trust value of agent B computed by agents A is calculated using equation 1, adapted from [18] as such: TAB=ORAB= γDRAB+ (1-γ)(μ1IRi1B+ μ2IRi2B+μ1IRi3B) DRAB=E(Beta(α,β)) E=α/α+β with μ1+μ2+μ2=1 and 0<γ<1 (1) (2)
  • 3. DRAB represents the direct reputation of agent B view by agent A and is obtained through direct interactions using the mean of the beta distribution calculated from equation 2 extracted from [18]. IRi1B represents reputation coming from other agent i1 (as well as i2 and i3) and μ1, μ2 and μ3 represent the trustworthiness of the associations between each agent. Applying 1 to the broadcasting mechanism of figure 8, it gives: TMBP_ACE= γDRMBP_ACE+(1-γ)(μ1IRi1_ACE+μ2IRi2_ACE+μ1IRi3_ACE) (3) with μ1, μ2 and μ3 values calculated based on strategic broadcasting decision e.g. prioritisation of regional broadcasting or technology threat mitigation (see Section VII). 3. CASE STUDY IN ELECTRIC POWER DISTRIBUTION INFRASTRUCTURE The represent the modelling of MAS with ArchiMate for MAS, we complete, in this paper, the case study presented in [8]. To know: electricity is a difficultly storable good. Its production has to precisely fit with its consumption. To maintain and guarantee that balance, electric companies supervise the transport of the electricity and manage the electric network. They keep watching in real time both production (wind turbine) and consumption (electric warmer) values to maintain the safety of the system. In case of productivity problem, solutions are deployed like the importation of electricity from adjoining countries or user request, made via TV and newspapers, to adapt the usage of electric machines (e.g. stop washing machine or dryer). The broadcasting mechanism (Figure 4) aims at sending alerts to the population using media such as the SMS or tweets whenever a weather alert occurs. This section presents the core components of the broadcasting mechanism. The solution relies on a MAS technology on the top of the JADE framework [6]. Agents are disseminated on three layers of the infrastructure corresponding to geographical region (city, region or country) and they retrieve information from probes located in weather station and on the electric networks and representing with different values: pressure, temperature and electric voltage. The agents that compose the critical architecture are the following: The Alert Correlation Engine (ACE) collect, aggregates and analyses weather information coming from probes deployed over the network and weather stations. Confirmed alerts are sent to the Policy Instantiation Engine (PIE). The PIE receives confirmed alert from the ACE, set the severity level and the extent of the geographical response. The PIE instantiates high level alert messages, to be deployed. Finally the high level alert messages are transferred to the Message Supervising Point (MSP). The MSP, as explained in detailed in [9] is composed of two modules. The Policy Analysis (PA) is in charge of analysing the policies previously instantiated by the PIE. For that, the Policy Status database stores all communication policies and their current status (in progress, not applicable, by-passed, enforced, removed…) so that the PA module can check the consistency of the newly received message to be deployed. The second module is the Component Configuration Mapper that selects the appropriate communication channel. Figure 3 presents two different kinds of Message Broadcasting Point (MBP). Indeed, another advantage of MAS is that it is easy to implement from a model, specific agents in order to perform specific tasks. Concretely it enables us to use different channel of communication (e.g. SMS, e-mail, micro-blogging) to send alerts to citizens, hospitals, etc. By this way our electric blackout prevention system is easily extensible for future communications facilities. MBPs receive generic alert messages from the MSP. Then a specific parser converts the incoming alert message to the appropriate format according to the channel. Figure 3. MBP architecture To consider the mutual trust between agents, each agent maintains within it a database of levels of trust towards its pairs. This means e.g. that the MBP has a dedicated level of trust for the ACE and the MSP. The broadcasting alert architecture presented in this section is based on the ReD project [7]. The ReD (Reaction after Detection) project defines and designs a solution to enhance the detection/reaction process and improves the overall resilience of critical infrastructures. Figure 10 introduces the developed architecture illustrated with our weather broadcast alert system. The flow is supposed to begin with an alert detected by a probe. Figure 4. Broadcasting mechanism inside This alert is send to the ACE agent (City layer) that does or does not confirm the alert to the PIE. Afterwards, the PIE decides to apply new policies or to forward the alert to an ACE from a higher layer (Region Layer). The PIE agent sends the policies to the MSP agent, which decides which MBP is able to transform the high level alert message into an understandable format for the selected communication channel. In order to manage access rights, we have incorporated to ReD a Context Rights Management module (CRM). Block on the right on Figure 10. The CRM is in charge of providing access rights to agents (E.g. MBP to the probes and Logs File database, MSP to the Policy Rules Status database). The CRM uses the agent links and the crisis context database. The first database includes the link between two agents (type of contextual access right). The second database includes a set of crisis contexts. Thanks to these databases the CRM agent is able to detect the agent right to access each other’s at the operational layer depending on the context. 3.1 ACE Organizational layer In the Organizational layer of the ACE Agent (Figure 11) we have represented separately the monitoring aspect from the transaction
  • 4. aspect. We call a transaction a communication of information from one agent to another (e.g. the ACE sends an alert to a PIE) and then we consider the monitoring as the representation of information from an external device. Firstly the Organizational Role of the ACE is represented as a Collaboration of the PIE Role and the Device Role. Figure 5. Detailed reaction architecture for electricity distribution adaptation based on weather parameters Each Role of the Collaboration communicates with the ACE through a proper Organizational Interface one for the monitoring and another one for the transaction. ACE Role is providing two Organizational Services depending on only one Organizational Policy which is dealing with two Events respectively for the monitoring and the transaction. Secondly the two Organizational Services provided by the ACE agent are regrouped into a correlation service symbolized by the Product concept. This Product has the objective Value to reduce a crisis by giving a guaranty of short reaction time represented by the Contract concept. Finally the Contract is applied on Organizational Object as monitoring information and transaction information. 3.2 ACE Application layer For the Application layer of the ACE Agent (Figure 11) we found the separation between the transaction and the monitoring. Application Services for transactions and monitoring are, as in the Organizational Policy, linked to only one Application Policy. To highlight the collaboration between the ACE and the Monitored Device, we created a Collaboration concept named Monitoring Administration and shows that this collaboration is constituted of the Components of the ACE and the Components of the Device. Device’s components use the Application Monitoring Interface to communicate with the ACE’s components and the ACE’s components are composed of the Application Monitoring Interface. We use the same approach for the transaction part and rapidly show that the ACE’s components are composed of two interfaces deserving the two Application Services. Again the Application layer contains Data Object as Transaction Messages and Monitoring Messages used by the different Application Components of the layer. Figure 6. ACE agent model 3.3 ACE Technical layer We found in the Technical layer of the ACE Agent (Figure 11) another representation of the two collaborators of the ACE agent. Transaction and Monitoring Infrastructure are separated from each other. Both of them have Infrastructure Service connected to the ACE agent’s Node and an Infrastructure Interface where the collaborators can interact with it. Each Node is respectively connected to a Communication Path (represented by a logical Event Queuing) and uses different Artifacts to communicate. We have intentionally not instantiated Nodes for readability but the reader can easily imagine that an ACE agent can be deployed on a computer who’s running an operating system. Also the Network concept is not defined in our instantiation for the same reason. For example Monitoring Event Queue between the ACE agent and the Device can be represented as a Network concept, as an USB cable and for the Transaction Event Queue by an RJ45 cable. 3.4 ACE Organizational Policy To illustrate the Organizational Policies of the ACE we choose to represent the monitoring part of the ACE Role as an UML Use Case (Figure 12). Monitoring Events are illustrated in the Use Case as Extension Points and show their impacts on the behaviours realized in the Perform Monitoring Policy. Roles are presented as Actors and Collaborations are highlighted by the different link between the behaviours.
  • 5. Figure 7. ACE Monitoring Organizational Policies Use Case 3.5 ACE Application Policy Sequences Diagrams have been used to represent the behaviours performed by the Application Domain of the ACE Agent for the Application Policy: Perform Detection (Figure 13). In the Sequence Diagram, behaviour of each component is fit to his lifeline and in/out Events presented as inter-component methods call. Context analyse is performed by the component during the execution of his behaviour. Figure 8. Perform Detection – High level Sequence Diagram 4. SIMULATIONS In this paragraph we have simulated a heterogeneous network of ACE and PIE (Figure 14) agents running the reputation model in [9]. The framework used for the test environment has been developed in JAVA and simulate MAS network in a graphical environment. Each created agent is deployed on thread and is only connected to a central supervisor (Composed of an Agent Manager and a Graph Supervisor) that give him the list of his neighbors depending of his location on the network with a maximum edge size between agents. The protocol used asks ACE agents to send a message containing the collected data from the probe to the nearest PIE every five seconds. Test environment represents a city of 50x50km with a maximum of 5 kilometers connection distance between agents. Also simulations have been running several times during 120 seconds with different load of malicious agents, respectively 10%, 50% and 90%. Figure 9. Simulation network For each load of malicious agents in the network we have collected the trust table - equation 3 (section IV.3) - of the same PIE agent, representing his perception of his neighbors ACE (Table I.) Table I. PIE perception evolution 10% 50% 90% ACE Rep ACE Rep ACE Rep A73 0.8 A73 0.75 A73 0.62 A71 0.86 A71 0.87 A71 0.81 A80 0.69 A80 0.55 A80 0.15 A45 0.72 A45 0.98 A45 0.76 A55 0.91 A55 0.93 A55 0.9 A56 0.93 A56 0.0 A56 0.36 A66 0.82 A66 0.85 A66 0.72 A32 0.8 A32 0.81 A32 0.44 A35 0.84 A35 0.92 A35 0.99 A0 0.73 A0 0.71 A0 0.66 As the percentage of malicious growth, the threshold evolves according to the reputation. For instance, the reputation of PIE “A35” growth from 0.84 to 0.99 as the percentage of malicious PIE grows from 10% to 90%. 5. CONCLUSIONS AND FUTURE WORKS We have elaborated a an innovative version of ArchiMate® for MAS purpose to enrich the agent society collaborations and, more particularly, the description of the agent behavior endorsed in the policy component and using a reputation based trust model termed ARMAN. To illustrate our work, a case study has been performed in the frame of a critical infrastructure related to electrical power distribution. This case study has allowed illustrating and validating the definition of policies according to reaction strategy on the first hand, and depending on evolving trust parameters amongst agents on the other hand. Finally, we have simulated a heterogeneous network of ACE and PIE agents running the reputation model and where different load of malicious agents have been integrated. As future works, additional validations are expected in the next months on larger scale infrastructures. In parallel, a supporting tool is being developed. The upper validation has been allowed by the primary functionalities of it. Additional features of that latter will allow modulating the environment parameters in which the agents’ network is running and thereby, it will allow refining and validating the trust based policies evolution along more complex situations. 6. ACKNOWLEDGEMENTS This research is supported and funded by the European FP7- Security project “CockpiCI”, Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures. 7. REFERENCES [1] M. Lankhorst. ArchiMate language primer, 2004. [2] J. A. Zachman. 2003. The Zachman Framework For Enterprise Architecture : Primer for Enterprise Engineering and Manufacturing By. Engineering, no. July: 1-11. [3] F. Zambonelli, N. R. Jennings, and M. Wooldridge. 2003. Developing multiagent systems: The Gaia methodology. ACM Trans. Softw. Eng. Methodol. 12, 3 (July 2003), 317-370. [4] V.Torres da Silva, R. Choren, and C. J. P. de Lucena. 2004. A UML Based Approach for Modeling and Implementing Multi-Agent Systems. In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - (AAMAS '04), Vol. 2. IEEE Computer Society, Washington, DC, USA, 914-921. [5] G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. Gâteau, D. Khadraoui, Z. Guessoum, Financial Critical Infrastructure: A MAS Trusted Architecture for Alert Detection and Authenticated Transactions, Sixth IEEE Conference on Network Architecture and Information System Security (IEEE SAR/SSI2011), France [6] G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, D. Khadraoui, Z. Guessoum, Reputation based Dynamic Responsibility to Agent
  • 6. for Critical Infrastructure, IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2011, Lyon, France. [7] [8] [9] C. Hahn. 2008. A domain specific modeling language for multiagent systems. In Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - (AAMAS '08), Vol. 1. International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 233-240. [10] AUML (Agent UML), http://www.auml.org/ [11] Prometheus Methodology. http://www.cs.rmit.edu.au/agents/SAC2/methodology.html [12] [13] M. Lankhorst. ArchiMate language primer, 2004. [14] J. A. Zachman. 2003. The Zachman Framework For Enterprise Architecture : Primer for Enterprise Engineering and Manufacturing By. Engineering, no. July: 1-11. [15] [16] UML 2 ( http://www.uml.org/) . [17] [18] . [19] G. Guemkam, D. Khadraoui, B. Gâteau, Z. Guessoum, ARMAN: Agent-based Reputation for Mobile Ad hoc Networks. 11th Conference on Practical Applications of Agents and Multi-Agent Systems. Salamanca, Spain 22nd-24 May 2013. J. Blangenois, G. Guemkam, C. Feltus, D. Khadraoui, Organizational Security Architecture for Critical Infrastructure, 8th International Workshop on Frontiers in Availability, FARES 2013, an International Workshop of the eight International Conference ARES.