Thirunavukkarasu et al., 1995 - Google Patents
Secret agents-a security architecture for the KQML agent communication languageThirunavukkarasu et al., 1995
View PDF- Document ID
- 18130428366774140509
- Author
- Thirunavukkarasu C
- Finin T
- Mayfield J
- et al.
- Publication year
- Publication venue
- CIKM'95 Intelligent Information Agents Workshop
External Links
Snippet
KQML is a message protocol and format for software agents to communicate with each other. In this paper we discuss the security features that a KQML user would expect and an architecture to satisfy those expectations. The proposed architecture is based on …
- 238000004891 communication 0 title description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thirunavukkarasu et al. | Secret agents-a security architecture for the KQML agent communication language | |
US7949875B2 (en) | Message authentication | |
US8646104B2 (en) | Stateless challenge-response broadcast protocol | |
Needham et al. | Using encryption for authentication in large networks of computers | |
Gasser et al. | An architecture for practical delegation in a distributed system | |
US7171001B2 (en) | Method and apparatus for managing secure collaborative transactions | |
JP3605501B2 (en) | Communication system, message processing method, and computer system | |
EP2020797B1 (en) | Client-server Opaque token passing apparatus and method | |
US20090313353A1 (en) | Copyrighted content delivery over p2p file-sharing networks | |
Schaad et al. | Certificate management over CMS (CMC) | |
JP2004509398A (en) | System for establishing an audit trail for the protection of objects distributed over a network | |
US20040236953A1 (en) | Method and device for transmitting an electronic message | |
EP1493243B1 (en) | Secure file transfer | |
Liu et al. | A secure cookie protocol | |
JP3765191B2 (en) | Object access control method | |
WO2008065346A2 (en) | Secure messaging and data sharing | |
Finin et al. | A Security Architecture for Agent Communication Language | |
Reid | Plugging the holes in host-based authentication | |
Beurdouche et al. | RFC 9750: The Messaging Layer Security (MLS) Architecture | |
O'Connell et al. | Jfs: a secure distributed file system for network computers | |
Power et al. | Authentication in a heterogeneous environment | |
Van Droogenbroeck | Introduction to PKI-public key infrastructure | |
CN119483922A (en) | Interface authentication method and system based on heartbeat connection | |
Infrastructure | Introduction to PKI-Public Key Infrastructure | |
Czerwinski et al. | A secure service discovery service |