Communications of the ACM
The ZEUS Agent Building Tool-kit
BT Technology Journal
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Moving up the information food chain: deploying softbots on the world wide web
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 2
DIET — A Scalable, Robust and Adaptable Multi-Agent Platform for Information Management
BT Technology Journal
Hi-index | 0.00 |
The problem of network security is now heavily focused on user and agent authentication. In particular, higher levels of automated management and autonomous behaviour are economically necessary within security services. This work focuses on a peer-to-peer (P2P) network architecture in support of an authentication service application. The paper considers whether the key properties of P2P systems, such as scalability, robustness and resilience, may be of significant value in the context of designing a secure agent-based user authentication service.The task of authenticating legitimate network users across distributed systems and services remains a challenging process. The proposed solution is to use a distributed agent-based application to address the process of client authentication and the maintenance of user credentials. Using an agent-to-agent platform, an autonomous and scalable defence mechanism has been constructed. The agent architecture provides a number of security services with the goal of automating the process of user authentication and trust management. In particular, the agents handle all password, encryption keys and certificate management.