Filters








26,715 Hits in 2.9 sec

Anonymity Architecture for Mobile Agent Systems [chapter]

Rafał Leszczyna
Lecture Notes in Computer Science  
The paper presents a new security architecture for MAS, which supports anonymity of agent owners.  ...  Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the elements of the second module.  ...  One of them is that agent environments, especially those which allow for mobility of agents (Mobile Agent Systems -MAS), are much more difficult to protect from intruders than conventional systems.  ... 
doi:10.1007/978-3-540-74481-8_10 fatcat:vizojoptlvc5bft3ry5paprknm

The quest for personal control over mobile location privacy

Qi He, Dapeng Wu, P. Khosla
2004 IEEE Communications Magazine  
With authorized-anonymous-IDs, we design an architecture that is capable of achieving complete personal control over location privacy while maintaining the authentication function required by the administration  ...  To address this issue, we propose an authorized-anonymous-ID based scheme; this scheme effectively eliminates the need for a trusted server or administration, which is assumed in the previous work.  ...  Agent-based System Architecture Since the properties of agents meet the security requirements imposed by ubiquitous computing, we design an agent-based system architecture for location privacy protection  ... 
doi:10.1109/mcom.2004.1299356 fatcat:yvxs3tkdvzef3as6zt2nuyx2wq

Multi-Agent System for Business Applications

Martin Tomášek
2015 Acta Electrotechnica et Informatica  
The software architecture identifies distributed locations as abstractions of distributed computational system and various software agents as abstractions of different autonomous functional components.  ...  The interactions among agents within a system are the most critical for the application. Most common and one of the elementary types of e-commerce applications is consumer buying behavior.  ...  Anonymous communication This scheme is used for cooperation of mobile agents in a group to perform a user task.  ... 
doi:10.15546/aeei-2015-0015 fatcat:s4uon7rvivcqtedke5yhkgsufy

Past to Present Overview of Mobile Wallet Payments Architectures to Compare and Identify Overall Participants

Mansi Bosamia, Dharmendra Patel
2018 International Journal of Computer Applications  
Early era, mobile phones are only used for calls, then for few apps and now for everything by just one touch.  ...  At this point of mobile wallet innovations, we take a literature review on available mobile wallet transaction architectures and identify the number of overall participants in these architectures.  ...  In near future, a multi-agent system for mobile wallet payment may introduce and it may have very complicated issues for more verification and authentication. [5] The agent accepts transaction requests  ... 
doi:10.5120/ijca2018917227 fatcat:dp76wfl225dxnbzfxnuds4ltka

Privacy in location-based services

Chi-Yin Chow, Mohamed F. Mokbel
2009 SIGSPATIAL Special  
In this article, we will briefly discuss these two main research issues with respect to five different system architectures for privacy-preserving LBS.  ...  Trusted Third Party Architecture The main idea of this architecture is to employ a trusted third party, termed location anonymizer, to be placed between mobile users and the LBS provider.  ... 
doi:10.1145/1567253.1567258 fatcat:hwe47hijs5acrbizc25wyx5iny

Anonymous Authentication for Secure Mobile Agent Based Internet Business

Sivaraman Audithan, Thanjavur Swaminathan Murunya, Pandi Vijayakumar
2016 Circuits and Systems  
Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses.  ...  In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users.  ...  [8] proposed a novel secure architectural system model with enhanced trust relationship between the mobile agents. This model imparts authentication and authorization mechanisms to mobile agents.  ... 
doi:10.4236/cs.2016.78124 fatcat:iq25gqxdwvfc7axqajgiqw7jc4

Just-in-time information sharing architectures in multiagent systems

Jonathan Carter, Ali A. Ghorbani, Stephen Marsh
2002 Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02  
ACORN (Agent-based Community Oriented Routing Network) is a distributed multi-agent architecture for the search, distribution and management of information across networks.  ...  The concept of an anonymous service provider is introduced to allow clients to generate anonymous agents that cannot be traced back to the original creator of the agent.  ...  These additions include: • the capability of users to remain anonymous (or private), • the ability of the system to support a fat / thin agent structure (see Section 3.4), • a Directory Server architecture  ... 
doi:10.1145/544889.544893 fatcat:xuycxs47lfgdtmyqhv3bnaqjra

Just-in-time information sharing architectures in multiagent systems

Jonathan Carter, Ali A. Ghorbani, Stephen Marsh
2002 Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02  
ACORN (Agent-based Community Oriented Routing Network) is a distributed multi-agent architecture for the search, distribution and management of information across networks.  ...  The concept of an anonymous service provider is introduced to allow clients to generate anonymous agents that cannot be traced back to the original creator of the agent.  ...  These additions include: • the capability of users to remain anonymous (or private), • the ability of the system to support a fat / thin agent structure (see Section 3.4), • a Directory Server architecture  ... 
doi:10.1145/544862.544893 dblp:conf/atal/CarterGM02 fatcat:jb26bmpzhfe3xiwolo5cigupri

A Novel Location Privacy-Preserving Approach Based on Blockchain

Ying Qiu, Yi Liu, Xuan Li, Jiahui Chen
2020 Sensors  
Our method satisfies the principle of k-anonymity privacy protection and does not need the help of trusted third-party anonymizing servers.  ...  Finally, we implement our approach in the Remix blockchain to show the efficiency, which further indicates the potential application prospect for the distributed network environment.  ...  Mobile terminal Anonymizer Query Result Obfuscated Query Request LBS server Query Request Contrary to the centralized architecture, the decentralized architecture does not require TTP anonymizing servers  ... 
doi:10.3390/s20123519 pmid:32575917 fatcat:mkltxsjcnnb2lbwi7hot5zciwq

Preface

Carlos Canal, Mirko Viroli
2007 Science of Computer Programming  
These include coordination, peer-to-peer systems, grid computing, Web services, multi-agent systems, and component-based systems.  ...  In this way, an API for global agreement protocols is defined independently of the underlying communication system.  ...  Last but not least, the paper by Frédéric Peschanski, Alexis Darrasse, Nataliya Guts and Jérémy Bobbio presents a coordination language for mobile agent systems that considers both the agents and the channels  ... 
doi:10.1016/j.scico.2007.02.001 fatcat:bv5fmyof2bgwtjnzonrndm34gi

A secure modular mobile agent system

Adam Pridgen, Christine Julien
2006 Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems - SELMAS '06  
of system  Modular agent design  Build the agent to suit the application  Flexibility for security needs SMASH Agent Architecture  Signature  Main Module  Agenda  Credentials  ...  between components SMASH Overview  Open platform system  Permit anonymous access  Allow anonymous coordination  Adapt privileges to current state  Security by design  Utilize  ... 
doi:10.1145/1138063.1138076 fatcat:yxlya5tmkvc3npjnswj2dohqcq

Anonymous Network Access Using the Digital Marketplace

Alisdair McDiarmid, James Irvine
2006 IEEE Vehicular Technology Conference  
With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important.  ...  We propose modifications to a novel call-management architecture, the Digital Marketplace, which will break this link, therefore enabling truly anonymous network access.  ...  Additionally, even when using anonymous communication schemes, the network operator is in a position to record communications metadata: for example, time of transmission; or in mobile systems, the user's  ... 
doi:10.1109/vtcf.2006.494 dblp:conf/vtc/McDiarmidI06 fatcat:h7rfrnwrx5glhmawkojqc46hy4

Towards Secure Mobile Multiagent Based Electronic Marketplace Systems

Klaus Fischer, Dieter Hutter, Matthias Klusch, Werner Stephan
2002 Electronical Notes in Theoretical Computer Science  
It rests upon research carried out in the past to develop innovative engineering solutions for architectures based on the paradigm of mobile multi-agents.  ...  In this paper we aim at a generic methodology to validate, assess, and construct mobile multi-agent systems in the domain of virtual market places.  ...  We propose three major levels for mobile multi-agent systems: the application architecture, the systems design and the computational level.  ... 
doi:10.1016/s1571-0661(04)80337-2 fatcat:kny4vf4gqzbklblcn7pldy6bim

Building Infrastructure Support for Ubiquitous Context-Aware Systems [chapter]

Wei Li, Martin Jonsson, Fredrik Kilander, Carl Gustaf Jansson
2004 Lecture Notes in Computer Science  
Many context-aware systems have been demonstrated in lab environments; however, due to some difficulties such as the scalability and privacy issues, they are not yet practical for deployment on a large  ...  This paper addresses these two issues with particular interest in user's privacy protection and spontaneous system association.  ...  System Architecture We designed a person-centric software architecture in our ACAS project [5], to provide affordable and adaptive support for facilitating mobile users' interactions with services in ubiquitous  ... 
doi:10.1007/978-3-540-30566-8_61 fatcat:ffhpbf6efjb6pnf3rt7antaoua

Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

IBalasaheb N. Jagdale, Nileema S. Gawande
2013 International Journal of Computer Network and Information Security  
This objective is achieved by simulating locally cloak algorithm and globally cloak algorithm for Manhattan mobility model and Waypoint mobility model using NS-2.34 environment.  ...  The primary objective of the present work is to develop a system which preserves the location privacy of the concerned individual.  ...  The system architecture design for the proposed system is as shown in the Fig.1 . System architecture shown in Fig.1 is executed by using simulation environment NS-2.34.  ... 
doi:10.5815/ijcnis.2013.01.02 fatcat:6llolktkbnhzjehbezlyhlztpu
« Previous Showing results 1 — 15 out of 26,715 results