Artificial intelligence: a modern approach
Artificial intelligence: a modern approach
A methodology for agent-oriented analysis and design
Proceedings of the third annual conference on Autonomous Agents
Multiagent systems: a modern approach to distributed artificial intelligence
Multiagent systems: a modern approach to distributed artificial intelligence
Agents in a Nutshell-A Very Brief Introduction
IEEE Transactions on Knowledge and Data Engineering
Cooperative Multiagent Systems: A Personal View of the State of the Art
IEEE Transactions on Knowledge and Data Engineering
Brain Meets Brawn: Why Grid and Agents Need Each Other
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
Role-based access control for data service integration
Proceedings of the 3rd ACM workshop on Secure web services
An extended RBAC profile of XACML
Proceedings of the 3rd ACM workshop on Secure web services
A framework for establishing, assessing, and managing trust in inter-organizational relationships
Proceedings of the 3rd ACM workshop on Secure web services
A framework of authentication and authorization for e-health services
Proceedings of the 3rd ACM workshop on Secure web services
Communication security in multi-agent systems
CEEMAS'03 Proceedings of the 3rd Central and Eastern European conference on Multi-agent systems
Hi-index | 0.00 |
Web services (WS) are commonly provided by software components accessed through remote procedure calls. One of the major problems encountered during the access process to any WS is their security in terms of, for instance, execution and exchanged data. Several solutions and proposals have been made to solve this problem mainly by OASIS. Despite their contributions, current solutions and proposals do not completely solve the security problem inherent to WS. In fact, they focused only on the definition of the security rules at the implementation level and neglected the design level of WS, which can induce important added values. In this paper, we outline how the agent based design approach can be exploited to provide for safe WS both at the design and implementation levels. More specifically, we show how volatile, mobile agents can guarantee secure WS through their autonomy, intelligence and mobility. In addition, we illustrate how various security solutions can be integrated in this design approach.