Multi-agent system for security service

This paper presents a multi-agent security service system architecture. This system consists of four types of agents: interface, authentication, authorization, and service provider agents. The interface agents interact with the users to fulfill their interests. The authentication agents investigate the validity of using keystroke dynamics to strengthen security. The authorization agents decide who can access which resources and for what purposes. The service provider agents offer different encryption services to different users. A prototype of the system is implemented using the Java agent development framework (JADE).

[1]  B. Gladman,et al.  Security Engineering: a Guide to Building Dependable Distributed Systems Physical Tamper Resistance 14.1 Introduction , 2022 .

[2]  Aladdin Ayesh,et al.  Framework of multi-agents internet security system , 2000 .

[3]  Chin-Chen Chang,et al.  A dynamic key-lock-pair access control scheme , 1991, Comput. Secur..

[4]  George Kurtz,et al.  Hacking Exposed: Network Security Secrets & Solutions , 1999 .

[5]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[6]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  Sun Meifeng,et al.  KeyNote Trust Management System , 2002 .

[8]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[9]  Timothy W. Finin,et al.  Developing Secure Agent Systems Using Delegation Based Trust Management , 2002, AAMAS 2002.

[10]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[11]  William J. Buchanan,et al.  An intelligent agent security intrusion system , 2002, Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems.

[12]  Sajjad Haider,et al.  A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[13]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[14]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System , 1998 .

[15]  Mohamed S. Kamel,et al.  Agent-Based System Architecture for Dynamic and Open Environments , 2003, Int. J. Inf. Technol. Decis. Mak..