Improving user verification by implementing an agent-based security system
نویسندگان
چکیده
منابع مشابه
Improving user verification by implementing an agent-based security system
This paper presents an agent-based, high-level security system for user verification. The system verifies a user’s identity by processing data from several low-lever sensors mounted at an entry point combined with knowledge of the user’s past behavior. The data from a new entry are processed by several agents, which store the knowledge in an ontology. A single agent’s classifications are integr...
متن کاملDesign and Verification of an Agent-Based System
The paper describes design and verification problems of agent-based systems. An agent-based system for support decision making for physicians is proposed. Knowledge base is represented by a propositional logic formulas and we use deductive reasoning. Model of the system is given in Statecharts visual language. Required properties of the system can be given as formulas of the branching-time temp...
متن کاملImplementing a Verification Methodology for McCullough Security
W e describe how to build a theorem generation mechanism for the validation of a security property which implies McCullough Security.
متن کاملDistributed Multi-Agent MSBN: Implementing Verification
Multiply Sectioned Bayesian Networks (MSBN) provide a coherence framework for multi-agent distributed interpretation tasks. During the construction or dynamic formation of an MSBN, automatic verification of d-sepset and the acyclicity of the overall structure is desired. Although verification has been implemented in a time-sharing fashion, new issues must be resolved in order to perform such ve...
متن کاملAn Agent Based Intrusion Detection System with Internal Security
Intrusion Detection Systems (IDS) are software or hardware products that automate the analysis process of traffic on a network or a host. and they are a complementary security tool in computer networks; it can be deployed at different points depending on the application, host or network segment to be monitored. Accordingly to its location, the IDS must be parameterized in a different way, for e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Ambient Intelligence and Smart Environments
سال: 2010
ISSN: 1876-1364
DOI: 10.3233/ais-2010-0050