Agents Ownership Setting by User Fingerprints
نویسندگان
چکیده
Agent ownership is a difficult task that touches legal domain. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent’s actions. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identity information carried by an agent. The first issue deals with users authentication process while the second issue deals with information encryption techniques, certificates etc. In this paper a new user authentication system requiring owner fingerprint in addition to the standard username/password pair is addressed. Fingerprint based identification systems exploits two basic premises: persistence, i.e. the basic characteristic of fingerprints do not change with time, and individuality, i.e. a fingerprint is unique to an individual. The implementation of the enhanced authentication system in the JADE-S platform, a FIPA compliant platform formed by the combination of the standard version of JADE with the JADE security plug-in, is also outlined.
منابع مشابه
User-based Vehicle Route Guidance in Urban Networks Based on Intelligent Multi Agents Systems and the ANT-Q Algorithm
Guiding vehicles to their destination under dynamic traffic conditions is an important topic in the field of Intelligent Transportation Systems (ITS). Nowadays, many complex systems can be controlled by using multi agent systems. Adaptation with the current condition is an important feature of the agents. In this research, formulation of dynamic guidance for vehicles has been investigated based...
متن کاملDetection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints
Many wireless Internet access operators prefer open local area network (WLAN) access because this reduces the need for user assistance for a variety of smaller devices. A 802.11 MAC spoofer masquerades as an authorized user and gains access by using an already whitelisted MAC address. We consider the scenario where the spoofer waits until the authorized user has finished the session, and then u...
متن کاملReputation and the Allo cation of Ownership∗
We show that the allocation of ownership matters even in long-term relationships where problems of opportunism are less severe unless the agents are very patient. Ownership structure is chosen to give agents the best incentives to cooperate. The optimal ownership structure of the static game restricts the gain from deviation to be the lowest but also the punishment will be minimal. The worst ow...
متن کاملJisc Technology Applications Programme (jtap) — Overview of Watermarks, Fingerprints, and Digital Signatures
This paper presents a technical overview of the capabilities and characteristics of technologies proposed for use as a means of providing copyright protection for digital information resources: a) Watermarks and fingerprints provide indication of ownership, and indication of the identity of a licensed user, respectively, by embedding security information in the digital object. This information ...
متن کاملAn Empirical Study on Price Differentiation Based on System Fingerprints
Price differentiation describes a marketing strategy to determine the price of goods on the basis of a potential customer’s attributes like location, financial status, possessions, or behavior. Several cases of online price differentiation have been revealed in recent years. For example, different pricing based on a user’s location was discovered for online office supply chain stores and there ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003