Enabling technology for knowledge sharing
AI Magazine
Communications of the ACM
Communications of the ACM
KQML as an agent communication language
CIKM '94 Proceedings of the third international conference on Information and knowledge management
Agent theories, architectures, and languages: a survey
ECAI-94 Proceedings of the workshop on agent theories, architectures, and languages on Intelligent agents
Expression of confidentiality policies with deontic logic
Deontic logic in computer science
Lockheed Environment for Automatic Programming
IEEE Expert: Intelligent Systems and Their Applications
Role-based security for distributed object systems
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Communication Agreement Framework for Access/Action Control
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
SafeBots: a paradigm for software security controls
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Inserting ilities by controlling communications
Communications of the ACM - Internet abuse in the workplace and Game engines in scientific research
Assimilation and survival in cyberspace
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Phobos: An Agent-Based User Authentication System
IEEE Intelligent Systems
Working Group Report on Application Security
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Authentication with P2P Agents
BT Technology Journal
Information Security Tech. Report
A framework for exploiting security expertise in application development
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
The paper discusses the potential effectiveness of ubiquitous, communicating, dynamically confederating security agents for monitoring and controlling communications among the components of preexisting applications. These agents remember events, communicate with other agents, draw inferences, and plan actions to achieve security goals. Key features of this approach are: (1) linguistic mechanisms for specifying agents, security models, and communications; (2) compilation mechanisms that automatically create and install agents as wrappers around existing application components; (3) algorithmic definitions of how agents communicate to increase the security of systems; and (4) a library of agent code fragments out of which the compilation mechanism builds actual agents. Automating the generation of security agents raises the possibility of the cost effective generation of enough redundant agents to tolerate some erroneous or subverted elements.