Improving user verification by implementing an agent-based security system

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving user verification by implementing an agent-based security system

This paper presents an agent-based, high-level security system for user verification. The system verifies a user’s identity by processing data from several low-lever sensors mounted at an entry point combined with knowledge of the user’s past behavior. The data from a new entry are processed by several agents, which store the knowledge in an ontology. A single agent’s classifications are integr...

متن کامل

Design and Verification of an Agent-Based System

The paper describes design and verification problems of agent-based systems. An agent-based system for support decision making for physicians is proposed. Knowledge base is represented by a propositional logic formulas and we use deductive reasoning. Model of the system is given in Statecharts visual language. Required properties of the system can be given as formulas of the branching-time temp...

متن کامل

Implementing a Verification Methodology for McCullough Security

W e describe how to build a theorem generation mechanism for the validation of a security property which implies McCullough Security.

متن کامل

Distributed Multi-Agent MSBN: Implementing Verification

Multiply Sectioned Bayesian Networks (MSBN) provide a coherence framework for multi-agent distributed interpretation tasks. During the construction or dynamic formation of an MSBN, automatic verification of d-sepset and the acyclicity of the overall structure is desired. Although verification has been implemented in a time-sharing fashion, new issues must be resolved in order to perform such ve...

متن کامل

An Agent Based Intrusion Detection System with Internal Security

Intrusion Detection Systems (IDS) are software or hardware products that automate the analysis process of traffic on a network or a host. and they are a complementary security tool in computer networks; it can be deployed at different points depending on the application, host or network segment to be monitored. Accordingly to its location, the IDS must be parameterized in a different way, for e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Ambient Intelligence and Smart Environments

سال: 2010

ISSN: 1876-1364

DOI: 10.3233/ais-2010-0050