Identity Management in Agent Systems

If agent-based applications are to be used in large scale, open environments, security is a main issue; digital identity management (DIDM) an essential element. DIDM is needed to be able to determine the rights and obligations of the four main

[1]  A.S. Tanenbaum,et al.  Security in a mobile agent system , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.

[2]  Virgílio A. F. Almeida,et al.  Masks: Bringing Anonymity and Personalization Together , 2003, IEEE Secur. Priv..

[3]  Brian Subirana,et al.  Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond , 2004 .

[4]  Agostino Poggi,et al.  Security and Trust in Agent-Oriented Middleware , 2003, OTM Workshops.

[5]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[6]  Frances M. T. Brazier,et al.  Lease-based Decentralized Resource Management in Open Multi-Agent Systems , 2005, FLAIRS Conference.

[7]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[8]  Andrew S. Tanenbaum,et al.  Scalable Naming in Global Middleware. , 2000 .

[9]  Frances M. T. Brazier,et al.  Issues in a Mobile Agent-based Multimedia Retrieval Scenario , 2005, BNAIC.

[10]  Agostino Poggi,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[11]  Frances M. T. Brazier,et al.  Scalable Middleware Environment for Agent-Based Internet Applications , 2004, PARA.

[12]  Todd Wright Naming services in multi-agent systems: a design for agent-based white pages , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[13]  A. Yip,et al.  Some Issues on Agent Ownership , 2002 .

[14]  Michael Luck,et al.  Agent technology, Computing as Interaction: A Roadmap for Agent Based Computing , 2005 .

[15]  John J. Borking,et al.  Privacy Incorporated Software Agent (PISA) - Proposal for building a privacy guardian for the electronic age , 2001, Datenschutz und Datensicherheit.

[16]  Volker Roth Scalable and Secure Global Name Services for Mobile Agents , 2000 .

[17]  Ravi S. Sandhu,et al.  On Five Definitions of Data Integrity , 1993, Database Security.

[18]  Alexander Yip,et al.  Some Issues on Agent Ownership 1 , 2002 .

[19]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[20]  John M. Boone,et al.  Integrity in Automated Information Systems , 1991 .