Finin et al., 1997 - Google Patents
A Security Architecture for Agent Communication LanguageFinin et al., 1997
View PDF- Document ID
- 10907970518336370017
- Author
- Finin T
- Mayfield J
- Thirunavukkarasu C
- Publication year
External Links
Snippet
One of the essential features of a software agent is its ability to cooperate with other software agents. This cooperation requires, in general, that software agents be able to communicate in a appropriately rich agent communication language (ACL) and associated protocols. For …
- 238000004891 communication 0 title abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7171001B2 (en) | Method and apparatus for managing secure collaborative transactions | |
US7039713B1 (en) | System and method of user authentication for network communication through a policy agent | |
Gasser et al. | An architecture for practical delegation in a distributed system | |
Molva et al. | KryptoKnight authentication and key distribution system | |
Haller et al. | On internet authentication | |
JP2004509398A (en) | System for establishing an audit trail for the protection of objects distributed over a network | |
Ganesan | The Yaksha security system | |
Finin et al. | A Security Architecture for Agent Communication Language | |
GB2395304A (en) | A digital locking system for physical and digital items using a location based indication for unlocking | |
JP2000196590A (en) | Method for analyzing contents of ciphered electronic data | |
van Oorschot | Message authentication by integrity with public corroboration | |
Osório et al. | The PRODNET communication infrastructure | |
Beurdouche et al. | RFC 9750: The Messaging Layer Security (MLS) Architecture | |
Mayfield et al. | A Security Architecture for Agent Communication Languages | |
Power et al. | Authentication in a heterogeneous environment | |
O'Connell et al. | Jfs: a secure distributed file system for network computers | |
Van Droogenbroeck | Introduction to PKI-public key infrastructure | |
Hodges et al. | Security and privacy considerations for the oasis security assertion markup language (saml) | |
Bai et al. | Access revocation and prevention of false repudiation in secure email exchanges | |
Gluck | Protection of Electronic Mail and Electronic Messages: Challenges andSolutions | |
May | A Security Architecture for Agent Communication Languages | |
Infrastructure | Introduction to PKI-Public Key Infrastructure | |
Bai | Secure electronic mail | |
Jeff Hodges et al. | Rev Date Author What | |
Miao | Secret sharing for mobile agent cryptography |