Authentication model based on Multi-Agent System

被引:0
作者
Constantinescu, Nicolae [1 ]
Popirlan, Claudiu Ionut [1 ]
机构
[1] Univ Craiova, Dept Comp Sci, 13 AI Cuza St, Craiova 200585, Romania
来源
ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES | 2011年 / 38卷 / 02期
关键词
authentication; cryptosystem; multi-agent system; master/slave architecture; JADE implementation;
D O I
暂无
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In any communication process the most important stage is represented by the authentication. If this stage ends successfully, the authenticated part can perform all operations for which it was given permission. So, along with the authentication, this process also informs the authenticated part what are its rights and its restrictions on the system. We propose an authentication model based on multi-agent system (MAS) structure. There is a master agent (MA) which receives the authentication request from the user, and multiple slave agents(SA) that, after solving a fixed number of tasks, they will send back the result to MA, which will decide if the authentication ends successfully. The structure of such a system and all the agent's tasks are presented in details. We apply the agent concept to facilitate the authentication process in order to work with multi-clients more dynamically and efficiently.
引用
收藏
页码:59 / 68
页数:10
相关论文
共 22 条
  • [1] Agnew G., 2001, ELECT COMMERCE TACTE, P69
  • [2] Bellare Mihir, 1998, MODULAR APPROACH DES
  • [3] Bellifemine F.L., 2007, DEV MULTIAGENT SYSTE, V7
  • [4] Brainard J., 2006, CCS 2006
  • [5] DTI, 2006, 06803 DTI URN
  • [6] Fugkeaw Somchart, 2007, IAENG International Journal of Computer Science, V33, P37
  • [7] Furnell S., 2005, Network Security, V2005, P8, DOI 10.1016/S1353-4858(05)00212-6
  • [8] FURNELL S, 2001, CYBERCRIME VANDALIZI
  • [9] SOFTWARE AGENTS
    GENESERETH, MR
    KETCHPEL, SP
    [J]. COMMUNICATIONS OF THE ACM, 1994, 37 (07) : 48 - &
  • [10] Hawkins S., 2000, INFORM MANAGEMENT CO, V8