Research on Agent-Based Coordinated-Control Network Security

被引:0
|
作者
Li, Yong [1 ]
Wang, Wenqi [2 ]
机构
[1] Anyang Normal Univ, Coll Educ Informat Technol, Anyang, Henan, South Korea
[2] Zhongyuan Univ Technol, Coll Comp Sci, Zhengzhou, Peoples R China
关键词
Internet security; coordinated-control; encryption authentication; communication protocol;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new architecture,agent-based coordinated- control framework was proposed. This architecture provided security communication between agent and subsystems,the security message delivery protocol among subsystems, the uniform encryption and authentication policy and intelligent cooperative mechanism support at low layer. At the same time because of flexible definition of system control message, the architecture is extensibility.
引用
收藏
页码:353 / +
页数:3
相关论文
共 50 条
  • [31] MAST - A mobile agent-based security tool
    Carvalho, M
    Cowin, T
    Suri, N
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS: II, 2003, : 317 - 323
  • [32] Agent-based dynamic information security model
    Kuo, MH
    INTERNATIONAL CONFERENCE ON INTEGRATION OF KNOWLEDGE INTENSIVE MULTI-AGENT SYSTEMS: KIMAS'03: MODELING, EXPLORATION, AND ENGINEERING, 2003, : 19 - 24
  • [33] Compositional refinement in agent-based security protocols
    McIver, A. K.
    Morgan, C. C.
    FORMAL ASPECTS OF COMPUTING, 2011, 23 (06) : 711 - 737
  • [34] SECURITY OF MOBILE AGENT-BASED WEB APPLICATIONS
    Ou, Chung-Ming
    Ou, C. R.
    Wang, Yao-Tien
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 107 - +
  • [35] Agent-Based Modelling for Security Risk Assessment
    Janssen, Stef
    Sharpanskykh, Alexei
    ADVANCES IN PRACTICAL APPLICATIONS OF CYBER-PHYSICAL MULTI-AGENT SYSTEMS: THE PAAMS COLLECTION, PAAMS 2017, 2017, 10349 : 132 - 143
  • [36] An intelligent agent-based model for security management
    Boudaoud, K
    McCathieNevile, C
    ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 877 - 882
  • [37] An Agent-Based Cloud Platform for Security Services
    De la Prieta, Fernando
    Corredera, Luis Enrique
    Sánchez-Martin, Antonio J.
    Demazeau, Yves
    Communications in Computer and Information Science, 2014, 430 : 333 - 343
  • [38] Agent-based Security System for User Verification
    Dovgan, Erik
    Kaluza, Bostjan
    Tusar, Tea
    Gams, Matjaz
    2009 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 3, 2009, : 331 - 334
  • [39] Security Framework for Agent-Based Cloud Computing
    Venkateshwaran, K.
    Malviya, Anu
    Dikshit, Utkarsha
    Venkatesan, S.
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03): : 35 - 42
  • [40] A security architecture for agent-based mobile systems
    Borselius, N
    Hur, N
    Kaprynski, M
    Mitchell, CJ
    THIRD INTERNATIONAL CONFERENCE ON 3G MOBILE COMMUNICATION TECHNOLOGIES, 2002, (489): : 312 - 318