Phobos: An Agent-Based User Authentication System

Managing the necessary public and private keys in a large organization is a serious challenge. Software agents can be an adaptive and responsive mechanism for managing users trying to connect to network resources. BTexact Technologies Intelligent Systems Laboratory has developed the Phobos agent architecture. Phobos uses a distributed team of cooperative autonomous agents to collectively authenticate user access requests. The advantages are that the agents can query multiple information sources to select the level of trust to delegate to a user and that n agents must concur to authenticate the user, hence increasing overall security. Phobos provides numerous security services to automate user authentication and trust-management processes.

[1]  Robert H. Guttman,et al.  Agents that Buy and Sell: Transforming Commerce as we Know It , 1999 .

[2]  Eugene H. Spafford,et al.  Defending a Computer System Using Autonomous Agents , 1995 .

[3]  Vasant Honavar,et al.  Intelligent agents for intrusion detection , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[4]  Timothy W. Finin,et al.  A Framework for Distributed Trust Management , 2001 .

[5]  Udo W. Pooch,et al.  A Methodology for Using Intelligent Agents to provide Automated Intrusion Response , 2000 .

[6]  Tuomas Sandholm,et al.  Contracting With Uncertain Level Of Trust , 1999, EC '99.

[7]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[8]  Robert E. Filman,et al.  Communicating security agents , 1996, Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises.

[9]  Giovanni Vigna,et al.  Mobile Agents and Security , 1998, Lecture Notes in Computer Science.

[10]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[11]  Katia P. Sycara,et al.  Adding security and trust to multiagent systems , 2000, Appl. Artif. Intell..

[12]  Joan Feigenbaum,et al.  A logic-based knowledge representation for authorization with delegation , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[13]  Pattie Maes,et al.  Agents that buy and sell , 1999, CACM.

[14]  Oren Etzioni,et al.  Moving Up the Information Food Chain: Deploying Softbots on the World Wide Web , 1996, AI Mag..

[15]  Eugene H. Spafford,et al.  Active Defense of a Computer System using Autonomous Agents , 1995 .