A dynamic key-lock-pair access control scheme
Computers and Security
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
An Intelligent Agent Security Intrusion System
ECBS '02 Proceedings of the 9th IEEE International Conference on Engineering of Computer-Based Systems
Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition
Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition
International Journal of Intelligent Engineering Informatics
The design and development of a secure keystroke system for u business
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
CRM: An efficient trust and reputation model for agent computing
Knowledge-Based Systems
On the analysis of reputation for agent-based web services
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
The tremendous growth of the network-centred (Internet and Intranet) computing environments requires new architecture for security services. Computer crimes are growing rapidly in these environments. In addition, these computing environments are open, and users may be connected or disconnected at any time. This makes computer security a necessity to all computer users. This paper presents a multi-agent system architecture for security services. The main objective of this system is to address some of the shortcomings that are present in contemporary security service systems that focused on providing solutions for specific security issues, such as authentication and authorization. Another objective is to provide a relatively complete security service solution to protect hosts and users. The proposed system architecture includes four types of agents: interface, authentication, authorization, and service provider agents (SPAs). The interface agents interact with the users to fulfill their interests. The authentication agents investigate the validity of using keystroke dynamics to strengthen security. The authorization agents make all decisions regarding who can access which resources and for what purposes. The SPAs offer different encryption services to different users. This paper provides the agents' architecture, design and implementations that enable them to cooperate, coordinate, and communicate with each other to provide a secure environment. A prototype of the system is implemented using the Java Agent Development Framework.