Personal Security Agent: KQML-based PKI
dc.contributor.author | He, Qi | |
dc.contributor.author | Sycara, Katia P. | |
dc.contributor.author | Finin, Timothy W. | |
dc.date.accessioned | 2019-02-06T16:23:38Z | |
dc.date.available | 2019-02-06T16:23:38Z | |
dc.date.issued | 1998-05-09 | |
dc.description | Second international conference on Autonomous agents | en_US |
dc.description.abstract | Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public key, is fundamental for electronic commerce and business across the Internet. To satisfy the requirements of various applications, PKI should demonstrate customization to user needs, interoperability and flexibility in its implementations so it can satisfy the needs of various applications. Particularly, due to the popularity of software agent-based applications over the Internet, security will be urgently needed by the “agent society”. We propose to implement the authority of authentication verification service systems as personal autonomous software agents, called security agents. In this paper, we present two aspects of KQML-based PKI: 1. the security agent concept and its functional modules; 2. an extension of KQML, which is needed for public key management and secure communications among security agents and application agents. | en_US |
dc.description.uri | https://dl.acm.org/citation.cfm?id=280865 | en_US |
dc.format.extent | 7 pages | en_US |
dc.genre | conference papers and proceedings preprints | en_US |
dc.identifier | doi:10.13016/m2gof7-wn6o | |
dc.identifier.citation | Qi He, Katia Sycara, and Tim Finin, Personal security agent: KQML-based PKI, Proceeding AGENTS '98 Proceedings of the second international conference on Autonomous agents Pages 377-384 , 1998, DOI: 10.1145/280765.280865 | en_US |
dc.identifier.uri | 10.1145/280765.280865 | |
dc.identifier.uri | http://hdl.handle.net/11603/12719 | |
dc.language.iso | en_US | en_US |
dc.publisher | ACM | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.subject | security | en_US |
dc.subject | agent architecture | en_US |
dc.subject | PKI(public key intrastructure) | en_US |
dc.subject | KQML | en_US |
dc.subject | authentication | en_US |
dc.subject | interoperability | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.title | Personal Security Agent: KQML-based PKI | en_US |
dc.type | Text | en_US |