Agent-oriented software engineering (workshop session)
Proceedings of the 22nd international conference on Software engineering
An agent-based approach for building complex software systems
Communications of the ACM
Trust and Commitment in Dynamic Logic
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Learning to trust in the competence and commitment of agents
Autonomous Agents and Multi-Agent Systems
Semantical considerations on dialectical and practical commitments
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 1
Strengthening employee's responsibility to enhance governance of IT: COBIT RACI chart case study
Proceedings of the first ACM workshop on Information security governance
Multi-agents system service based platform in telecommunication security incident reaction
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
An Agent-Based System to Support Assurance of Security Requirements
SSIRI '10 Proceedings of the 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement
Proceedings of the Fifth International Conference on Security of Information and Networks
Enabling fairer digital rights management with trusted computing
ISC'07 Proceedings of the 10th international conference on Information Security
Organizational Security Architecture for Critical Infrastructure
ARES '13 Proceedings of the 2013 International Conference on Availability, Reliability and Security
Hi-index | 0.00 |
Dynamic distributed wireless networks constitute a critical pillar for the information system. Nonetheless, the openness of these networks makes them very sensitive to external attack such as the DoS. Being able to monitor the conviction level of network components and to react in a short time once an incident is detected is a crucial challenge for their survival. In order to face those problems, research tends to evolve towards more dynamic solutions that are able to detect and validate network anomalies and to adapt themselves in order to retrieve a secure configuration. In this position paper, we complete our previous works and make the assignment of functions to agents more contextual. Our approach considers the concept of agent responsibility that we assigned dynamically to agent and that we exploit in order to analyze the level of "conviction" in the component. In this current paper, we provide an insight of the architecture without depicting the assignment mechanism neither the conviction calculation.