Communications of the ACM
Contracting with uncertain level of trust
Proceedings of the 1st ACM conference on Electronic commerce
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Moving up the information food chain: deploying softbots on the world wide web
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 2
NEXUS — Resilient Intelligent Middleware
BT Technology Journal
Towards secure resource sharing for impromptu collaboration in pervasive computing
Proceedings of the 2007 ACM symposium on Applied computing
Hi-index | 0.00 |
Creating confidential data via encryption is now a trivial task; however, managing the necessary public and private keys in a large organization is a serious challenge. Software agents can be an adaptive, responsive mechanism for managing client authentication and maintaining user credentials. By using a distributed community of software agents, we can match the growth in the software and hardware we seek to protect. Also, if these agents act collaboratively to distribute solutions to security violations, we can construct a rapid, scaleable defense mechanism. The prototype Phobos agent architecture offers such a solution to the authentication problem. It provides a number of security services with the goal of automating user authentication and trust management. In particular, the agents should handle all password, key, and certificate management. Phobos therefore provides a multiparty authentication service.