Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Secure electronic commerce: building the infrastructure for digital signatures and encryption
Secure electronic commerce: building the infrastructure for digital signatures and encryption
ACM Transactions on Information Systems (TOIS)
Agent-mediated electronic commerce: issues, challenges and some viewpoints
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Personal security agent: KQML-based PKI
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Liability for autonomous agent design
AGENTS '98 Proceedings of the second international conference on Autonomous agents
A Roadmap of Agent Research and Development
Autonomous Agents and Multi-Agent Systems
Semantic Issues in the Verification of Agent Communication Languages
Autonomous Agents and Multi-Agent Systems
PKI Seeks a Trusting Relationship
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
An Approach to Using XML and a Rule-Based Content Language with an Agent Communication Language
Issues in Agent Communication
On the Structure of Delegation Networks
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A Practically Implementable and Tractable Delegation Logic
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Agent-mediated electronic commerce: an MIT media laboratory perspective
International Journal of Electronic Commerce - Special issue: Intelligent agents for electronic commerce
Certificates for mobile code security
Proceedings of the 2002 ACM symposium on Applied computing
Autonomous trust construction in multi-agent systems: a graph theory methodology
Advances in Engineering Software
Supporting the legal identities of contracting agents with an agent authorization platform
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Trust management with delegation in grouped peer-to-peer communities
Proceedings of the eleventh ACM symposium on Access control models and technologies
Agent-based buddy-finding methodology for knowledge sharing
Information and Management
An Autonomous Trust Construction System Based on Bayesian Method
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Delegations guided by trust and autonomy
Web Intelligence and Agent Systems
A Secure Delegation Model Based on Multi-agent in Pervasive Environments
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Agent-based buddy-finding methodology for knowledge sharing
Information and Management
An architectural description language for secure Multi-Agent Systems
Web Intelligence and Agent Systems
Specifying standard security mechanisms in multi-agent systems
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
MagicNET: secure communication methodology for mobile agents
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A survey of security in multi-agent systems
Expert Systems with Applications: An International Journal
Distributed authorization framework for mobile agents
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Hi-index | 0.00 |
In this paper, we are going to show how to build up agent-oriented Public Key Infrastructure(PKI) from SPKI/SDSI and X.509 standards. A variety of delegation mechanisms for agents will be demonstrated under this agent-oriented PKI. The mechanisms include: chain-ruled, threshold, and conditional. The lack of agent security management standards did not allow us to do the agent trust and delegation in legalized manner so we proposed several new communicative acts to satisfy our agent delegation management. Finally, we briefly show how to implement these agent communication language and inner content language in XML and XML/RDF.