Single Sign-On Authentication Model using MAS(Mu1ti-Agent System)

نویسندگان

  • Dae-Hee Seo
  • Im-Yeong Lee
  • Soo-Young Chae
  • Choon-Soo Kim
چکیده

Absnnct-The rapid expansion of the Internet has provided users with a diverse range of semces. Most Internet users create many different IDS and passwords to subscribe to various Internet services. Thus, the SSO system has been proposed to supplement vulnerable security that may arise from inefficient management system where administrators and nsers manage a number of I D S . The SSO system eau provide heightened efficiency and security to users and administrators. Recently commercialized SSO systems iutegrate a single agent with the broker authentication model. However, this hybrid anthentication system caunot resolve problems such as those involving user pre-registration and anonymous users. It likewise cannot provide non-repudiation service between joining objem. Consequeutly, the hybrid system causes considerable security vulnerability. Since it cannot provide security semce for the agent itself, the user's private information and SSO system may have significant security vulnerability. This paper proposed an authentication model that integrates a broker anthentication model, out of various authentication models of the SSO system, with a multi-agent system. The proposed method adopts a secure multi-agent system that supplements the security wlnerability of an agent applied to the existing hybrid authentication system. The method proposes au SSO authentication model that satisfies various security requirements not provided by existing broker autheutication models and hybrid authentication systems. Ida Terms-Computer Security, Cryptography, SSO, MultiAgent

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-Application Authentication Based on Multi-Agent System

This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infrastructure (PKI) authentication scheme and the multi-agent technique. A key pair and a certificate issued by the Certification Authority (CA) are normally kept in a smart card or a token in order to enforce two-factor authe...

متن کامل

Secured Trust Communication in Multi-agent Systems

Nowadays security and privacy issues take a major role in multi-agent system. Mostly multiagent systems are open and dynamic in nature. This nature surely introduces a problem by providing secured communication. Message-Digest5 is presented to some security problems in multi agent systems based on distributed trust and the delegation of permissions and credibility. In particular, an agent will ...

متن کامل

A Single Sign-on Solution Based on PKI and PMI

Single Sign-on (SSO) is a useful technology that allows users to skip bothersome authentication processes during access to multiple services. In this paper, we propose a new SSO model named Broker Agent Gateway SSO (BAG-SSO), and present a campus network BAG-SSO solution that makes use of Public Key Infrastructure (PKI) to provide strong authentication and Privilege Management Infrastructure (P...

متن کامل

Light wieght Authentication System and resource Monitoirng using MAS

Application, resource and Network supervision and trust management is a significant issue due to today’s speedily development of computer and communication environment specially in Local Area Network (LAN).Client-server based network management approach suffer from problems such as insufficient scalability, interoperability, reliability, and flexibility, as networks become more geographically d...

متن کامل

Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology

The Internet is rapidly becoming the privileged environment for today’s Multi-Agent Systems. This introduces new issues in MAS’ design and development, from both a conceptual and a technological viewpoint. In particular, the dichotomy between the openness of the execution environment and the need for secure execution models makes governing agents’ interaction a really complex matter, especially...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004