[go: up one dir, main page]

Finin et al., 1997 - Google Patents

A Security Architecture for Agent Communication Language

Finin et al., 1997

View PDF
Document ID
10907970518336370017
Author
Finin T
Mayfield J
Thirunavukkarasu C
Publication year

External Links

Snippet

One of the essential features of a software agent is its ability to cooperate with other software agents. This cooperation requires, in general, that software agents be able to communicate in a appropriately rich agent communication language (ACL) and associated protocols. For …
Continue reading at redirect.cs.umbc.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
US7171001B2 (en) Method and apparatus for managing secure collaborative transactions
US7039713B1 (en) System and method of user authentication for network communication through a policy agent
Gasser et al. An architecture for practical delegation in a distributed system
Molva et al. KryptoKnight authentication and key distribution system
Haller et al. On internet authentication
JP2004509398A (en) System for establishing an audit trail for the protection of objects distributed over a network
Ganesan The Yaksha security system
Finin et al. A Security Architecture for Agent Communication Language
GB2395304A (en) A digital locking system for physical and digital items using a location based indication for unlocking
JP2000196590A (en) Method for analyzing contents of ciphered electronic data
van Oorschot Message authentication by integrity with public corroboration
Osório et al. The PRODNET communication infrastructure
Beurdouche et al. RFC 9750: The Messaging Layer Security (MLS) Architecture
Mayfield et al. A Security Architecture for Agent Communication Languages
Power et al. Authentication in a heterogeneous environment
O'Connell et al. Jfs: a secure distributed file system for network computers
Van Droogenbroeck Introduction to PKI-public key infrastructure
Hodges et al. Security and privacy considerations for the oasis security assertion markup language (saml)
Bai et al. Access revocation and prevention of false repudiation in secure email exchanges
Gluck Protection of Electronic Mail and Electronic Messages: Challenges andSolutions
May A Security Architecture for Agent Communication Languages
Infrastructure Introduction to PKI-Public Key Infrastructure
Bai Secure electronic mail
Jeff Hodges et al. Rev Date Author What
Miao Secret sharing for mobile agent cryptography