Agents Ownership Setting by User Fingerprints

نویسندگان

  • Salvatore Vitabile
  • Giovanni Pilato
  • Vincenzo Conti
  • Carmelo Ferrara
  • Filippo Sorbello
چکیده

Agent ownership is a difficult task that touches legal domain. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent’s actions. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identity information carried by an agent. The first issue deals with users authentication process while the second issue deals with information encryption techniques, certificates etc. In this paper a new user authentication system requiring owner fingerprint in addition to the standard username/password pair is addressed. Fingerprint based identification systems exploits two basic premises: persistence, i.e. the basic characteristic of fingerprints do not change with time, and individuality, i.e. a fingerprint is unique to an individual. The implementation of the enhanced authentication system in the JADE-S platform, a FIPA compliant platform formed by the combination of the standard version of JADE with the JADE security plug-in, is also outlined.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

User-based Vehicle Route Guidance in Urban Networks Based on Intelligent Multi Agents Systems and the ANT-Q Algorithm

Guiding vehicles to their destination under dynamic traffic conditions is an important topic in the field of Intelligent Transportation Systems (ITS). Nowadays, many complex systems can be controlled by using multi agent systems. Adaptation with the current condition is an important feature of the agents. In this research, formulation of dynamic guidance for vehicles has been investigated based...

متن کامل

Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints

Many wireless Internet access operators prefer open local area network (WLAN) access because this reduces the need for user assistance for a variety of smaller devices. A 802.11 MAC spoofer masquerades as an authorized user and gains access by using an already whitelisted MAC address. We consider the scenario where the spoofer waits until the authorized user has finished the session, and then u...

متن کامل

Reputation and the Allo cation of Ownership∗

We show that the allocation of ownership matters even in long-term relationships where problems of opportunism are less severe unless the agents are very patient. Ownership structure is chosen to give agents the best incentives to cooperate. The optimal ownership structure of the static game restricts the gain from deviation to be the lowest but also the punishment will be minimal. The worst ow...

متن کامل

Jisc Technology Applications Programme (jtap) — Overview of Watermarks, Fingerprints, and Digital Signatures

This paper presents a technical overview of the capabilities and characteristics of technologies proposed for use as a means of providing copyright protection for digital information resources: a) Watermarks and fingerprints provide indication of ownership, and indication of the identity of a licensed user, respectively, by embedding security information in the digital object. This information ...

متن کامل

An Empirical Study on Price Differentiation Based on System Fingerprints

Price differentiation describes a marketing strategy to determine the price of goods on the basis of a potential customer’s attributes like location, financial status, possessions, or behavior. Several cases of online price differentiation have been revealed in recent years. For example, different pricing based on a user’s location was discovered for online office supply chain stores and there ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003