Thu Nov 3 18:04:10 2005
UMBC AgentWeb
[an error occurred while processing this directive]

AgentWeb: Topics: Security
Search web for similar pages

Subcategories

  • rfi: agent security 3/8/01 Who points to it? 23 - FIPA has issues an RFI (request for information) in the area of agentsecurity aimed at collecting input, requirements and suggestions tohelp establish new work plans. Submissions should focus on securitymechanisms to implement security policies and the policies andrequirements that constrain those mechanisms. Submissions are dueApril 2, 2001 and wil be discussed in the London meeting beginningthen.

  • Security in Mobile-Agent Systems 1/2/00 Who points to it? 25 - Gray, Robert: Security in Mobile-Agent Systems. Presentation at the University of Leiden,1996.

  • Mobile Agent Security - Threats, Countermeasures, and New Research Areas 1/2/00 Who points to it? 18 - NIST HTML presentation (PowerPoint images)

  • The Things that Go Bump in the Net 1/2/00 Who points to it? 12 - an informal survey of some of the more colorful beasts in the menagerieof security and related problems in networky and agenty systems

  • Secret Agents -- A Security Architecture for the KQML Agent Communication Language 1/2/00 Who points to it? 14 - ChelliahThirunavukkarasu (EIT), Tim Finin (UMBC) and James Mayfield (UMBC), October 1995. 200K bytespostscript. (Draft submitted to the CIKM'95 Intelligent Information Agents Workshop, Baltimore, December1995.)

  • Simulated Social Control for Secure Internet Commerce 1/2/00 Who points to it? 12 - Lars Rasmusson Sverker Jansson, Swedish Institute ofComputer Science, 1 April, 1996. ABstract: In this paper we suggest that soft security such as social controlhas to be used to create secure open systems. Social control means that it is the participants themselves whoare responsible for the security, as opposed to leaving the security to some external or global authority. Socialmechanisms don't deny the existence of malicious participants. Instead they are aiming at avoiding interactionwith them. This makes them more robust than hard security mechanisms such as passwords, who revealeverything if they are bypassed. We describe our work in progress of constructing a workbench to runsimulations of electronic markets. By examining the success of different security mechanisms to avoidmaliciously behaving actors we hope to gain insight into how to create electronic markets. The idea of creatingreputations for the participants is discussed. Finally some legal aspects on using social control and reputation assecurity mechanisms are discussed.

  • Mobile Agents and Security 1/2/00 Who points to it? 15 - Mobile Agents and Security,G. Vigna (Ed.): LNCS 1419, springer.

  • Bibliography on Security in Mobile Agent Systems 1/2/00 Who points to it? 16

  • Mobile Agent Security (NIST) 1/2/00 Who points to it? 13

Edited by Tim Finin & Yannis Labrou of UMBC ebiquity and the UMBC Computer Science and Electrical Engineering Department. Comments to agentweb@agents.umbc.edu. Hits in red Who points to it? shows inverse links. Built by bk2site.