Sciweavers

2979 search results - page 264 / 596
» Modelling secure multiagent systems
Sort
View
WOA
2010
15 years 2 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
ESAW
2004
Springer
15 years 10 months ago
T-Compound Interaction and Overhearing Agents
Overhearing is an indirect interaction type that enacts agents to listen to direct interactions among other agents without taking explicit part in the exchanges. In this paper, we ...
Eric Platon, Nicolas Sabouret, Shinichi Honiden
SEKE
2004
Springer
15 years 10 months ago
A UML-based Software Engineering Methodology for Agent Factory
This paper presents the Agent Factory Development Methodology, an Agent-Oriented Software Engineering (AOSE) methodology that employs a synthesis of the Unified Modelling Languag...
Rem W. Collier, Gregory M. P. O'Hare, Colm Rooney
125
Voted
CEEMAS
2001
Springer
15 years 9 months ago
MAS Oriented Patterns
Multiagent systems (MAS) are spreading, in the academic world as well as in industry. Nevertheless, MAS design is still a problem. The agent community now has some experience. So, ...
Sylvain Sauvage
CSREASAM
2006
15 years 6 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin