[go: up one dir, main page]

Thirunavukkarasu et al., 1995 - Google Patents

Secret agents-a security architecture for the KQML agent communication language

Thirunavukkarasu et al., 1995

View PDF
Document ID
18130428366774140509
Author
Thirunavukkarasu C
Finin T
Mayfield J
et al.
Publication year
Publication venue
CIKM'95 Intelligent Information Agents Workshop

External Links

Snippet

KQML is a message protocol and format for software agents to communicate with each other. In this paper we discuss the security features that a KQML user would expect and an architecture to satisfy those expectations. The proposed architecture is based on …
Continue reading at ebiquity.umbc.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Similar Documents

Publication Publication Date Title
Thirunavukkarasu et al. Secret agents-a security architecture for the KQML agent communication language
US7949875B2 (en) Message authentication
US8646104B2 (en) Stateless challenge-response broadcast protocol
Needham et al. Using encryption for authentication in large networks of computers
Gasser et al. An architecture for practical delegation in a distributed system
US7171001B2 (en) Method and apparatus for managing secure collaborative transactions
JP3605501B2 (en) Communication system, message processing method, and computer system
EP2020797B1 (en) Client-server Opaque token passing apparatus and method
US20090313353A1 (en) Copyrighted content delivery over p2p file-sharing networks
Schaad et al. Certificate management over CMS (CMC)
JP2004509398A (en) System for establishing an audit trail for the protection of objects distributed over a network
US20040236953A1 (en) Method and device for transmitting an electronic message
EP1493243B1 (en) Secure file transfer
Liu et al. A secure cookie protocol
JP3765191B2 (en) Object access control method
WO2008065346A2 (en) Secure messaging and data sharing
Finin et al. A Security Architecture for Agent Communication Language
Reid Plugging the holes in host-based authentication
Beurdouche et al. RFC 9750: The Messaging Layer Security (MLS) Architecture
O'Connell et al. Jfs: a secure distributed file system for network computers
Power et al. Authentication in a heterogeneous environment
Van Droogenbroeck Introduction to PKI-public key infrastructure
CN119483922A (en) Interface authentication method and system based on heartbeat connection
Infrastructure Introduction to PKI-Public Key Infrastructure
Czerwinski et al. A secure service discovery service