
Thu Nov 3 18:04:10 2005
|
UMBC AgentWeb
[an error occurred while processing this directive]
|
|
AgentWeb: Topics: Security
Search web for similar pages
Subcategories
- rfi: agent security
3/8/01
23 - FIPA has issues an RFI (request for information) in the area of agentsecurity aimed at collecting input, requirements and suggestions tohelp establish new work plans. Submissions should focus on securitymechanisms to implement security policies and the policies andrequirements that constrain those mechanisms. Submissions are dueApril 2, 2001 and wil be discussed in the London meeting beginningthen.
- Security in Mobile-Agent Systems
1/2/00
25 - Gray, Robert: Security in Mobile-Agent Systems. Presentation at the University of Leiden,1996.
- Mobile Agent Security - Threats, Countermeasures, and New Research Areas
1/2/00
18 - NIST HTML presentation (PowerPoint images)
- The Things that Go Bump in the Net
1/2/00
12 - an informal survey of some of the more colorful beasts in the menagerieof security and related problems in networky and agenty systems
- Secret Agents -- A Security Architecture for the KQML Agent Communication Language
1/2/00
14 - ChelliahThirunavukkarasu (EIT), Tim Finin (UMBC) and James Mayfield (UMBC), October 1995. 200K bytespostscript. (Draft submitted to the CIKM'95 Intelligent Information Agents Workshop, Baltimore, December1995.)
- Simulated Social Control for Secure Internet Commerce
1/2/00
12 - Lars Rasmusson Sverker Jansson, Swedish Institute ofComputer Science, 1 April, 1996. ABstract: In this paper we suggest that soft security such as social controlhas to be used to create secure open systems. Social control means that it is the participants themselves whoare responsible for the security, as opposed to leaving the security to some external or global authority. Socialmechanisms don't deny the existence of malicious participants. Instead they are aiming at avoiding interactionwith them. This makes them more robust than hard security mechanisms such as passwords, who revealeverything if they are bypassed. We describe our work in progress of constructing a workbench to runsimulations of electronic markets. By examining the success of different security mechanisms to avoidmaliciously behaving actors we hope to gain insight into how to create electronic markets. The idea of creatingreputations for the participants is discussed. Finally some legal aspects on using social control and reputation assecurity mechanisms are discussed.
- Mobile Agents and Security
1/2/00
15 - Mobile Agents and Security,G. Vigna (Ed.): LNCS 1419, springer.
- Bibliography on Security in Mobile Agent Systems
1/2/00
16
- Mobile Agent Security (NIST)
1/2/00
13
|