A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Anonymity Architecture for Mobile Agent Systems
[chapter]
Lecture Notes in Computer Science
The paper presents a new security architecture for MAS, which supports anonymity of agent owners. ...
Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the elements of the second module. ...
One of them is that agent environments, especially those which allow for mobility of agents (Mobile Agent Systems -MAS), are much more difficult to protect from intruders than conventional systems. ...
doi:10.1007/978-3-540-74481-8_10
fatcat:vizojoptlvc5bft3ry5paprknm
The quest for personal control over mobile location privacy
2004
IEEE Communications Magazine
With authorized-anonymous-IDs, we design an architecture that is capable of achieving complete personal control over location privacy while maintaining the authentication function required by the administration ...
To address this issue, we propose an authorized-anonymous-ID based scheme; this scheme effectively eliminates the need for a trusted server or administration, which is assumed in the previous work. ...
Agent-based System Architecture Since the properties of agents meet the security requirements imposed by ubiquitous computing, we design an agent-based system architecture for location privacy protection ...
doi:10.1109/mcom.2004.1299356
fatcat:yvxs3tkdvzef3as6zt2nuyx2wq
Multi-Agent System for Business Applications
2015
Acta Electrotechnica et Informatica
The software architecture identifies distributed locations as abstractions of distributed computational system and various software agents as abstractions of different autonomous functional components. ...
The interactions among agents within a system are the most critical for the application. Most common and one of the elementary types of e-commerce applications is consumer buying behavior. ...
Anonymous communication This scheme is used for cooperation of mobile agents in a group to perform a user task. ...
doi:10.15546/aeei-2015-0015
fatcat:s4uon7rvivcqtedke5yhkgsufy
Past to Present Overview of Mobile Wallet Payments Architectures to Compare and Identify Overall Participants
2018
International Journal of Computer Applications
Early era, mobile phones are only used for calls, then for few apps and now for everything by just one touch. ...
At this point of mobile wallet innovations, we take a literature review on available mobile wallet transaction architectures and identify the number of overall participants in these architectures. ...
In near future, a multi-agent system for mobile wallet payment may introduce and it may have very complicated issues for more verification and authentication. [5] The agent accepts transaction requests ...
doi:10.5120/ijca2018917227
fatcat:dp76wfl225dxnbzfxnuds4ltka
Privacy in location-based services
2009
SIGSPATIAL Special
In this article, we will briefly discuss these two main research issues with respect to five different system architectures for privacy-preserving LBS. ...
Trusted Third Party Architecture The main idea of this architecture is to employ a trusted third party, termed location anonymizer, to be placed between mobile users and the LBS provider. ...
doi:10.1145/1567253.1567258
fatcat:hwe47hijs5acrbizc25wyx5iny
Anonymous Authentication for Secure Mobile Agent Based Internet Business
2016
Circuits and Systems
Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. ...
In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users. ...
[8] proposed a novel secure architectural system model with enhanced trust relationship between the mobile agents. This model imparts authentication and authorization mechanisms to mobile agents. ...
doi:10.4236/cs.2016.78124
fatcat:iq25gqxdwvfc7axqajgiqw7jc4
Just-in-time information sharing architectures in multiagent systems
2002
Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02
ACORN (Agent-based Community Oriented Routing Network) is a distributed multi-agent architecture for the search, distribution and management of information across networks. ...
The concept of an anonymous service provider is introduced to allow clients to generate anonymous agents that cannot be traced back to the original creator of the agent. ...
These additions include: • the capability of users to remain anonymous (or private), • the ability of the system to support a fat / thin agent structure (see Section 3.4), • a Directory Server architecture ...
doi:10.1145/544889.544893
fatcat:xuycxs47lfgdtmyqhv3bnaqjra
Just-in-time information sharing architectures in multiagent systems
2002
Proceedings of the first international joint conference on Autonomous agents and multiagent systems part 2 - AAMAS '02
ACORN (Agent-based Community Oriented Routing Network) is a distributed multi-agent architecture for the search, distribution and management of information across networks. ...
The concept of an anonymous service provider is introduced to allow clients to generate anonymous agents that cannot be traced back to the original creator of the agent. ...
These additions include: • the capability of users to remain anonymous (or private), • the ability of the system to support a fat / thin agent structure (see Section 3.4), • a Directory Server architecture ...
doi:10.1145/544862.544893
dblp:conf/atal/CarterGM02
fatcat:jb26bmpzhfe3xiwolo5cigupri
A Novel Location Privacy-Preserving Approach Based on Blockchain
2020
Sensors
Our method satisfies the principle of k-anonymity privacy protection and does not need the help of trusted third-party anonymizing servers. ...
Finally, we implement our approach in the Remix blockchain to show the efficiency, which further indicates the potential application prospect for the distributed network environment. ...
Mobile terminal Anonymizer Query Result Obfuscated Query Request
LBS server Query Request Contrary to the centralized architecture, the decentralized architecture does not require TTP anonymizing servers ...
doi:10.3390/s20123519
pmid:32575917
fatcat:mkltxsjcnnb2lbwi7hot5zciwq
Preface
2007
Science of Computer Programming
These include coordination, peer-to-peer systems, grid computing, Web services, multi-agent systems, and component-based systems. ...
In this way, an API for global agreement protocols is defined independently of the underlying communication system. ...
Last but not least, the paper by Frédéric Peschanski, Alexis Darrasse, Nataliya Guts and Jérémy Bobbio presents a coordination language for mobile agent systems that considers both the agents and the channels ...
doi:10.1016/j.scico.2007.02.001
fatcat:bv5fmyof2bgwtjnzonrndm34gi
A secure modular mobile agent system
2006
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems - SELMAS '06
of system
Modular agent design
Build the agent to suit the application
Flexibility for security needs
SMASH Agent Architecture
Signature
Main Module
Agenda
Credentials ...
between components
SMASH Overview
Open platform system
Permit anonymous access
Allow anonymous coordination
Adapt privileges to current state
Security by design
Utilize ...
doi:10.1145/1138063.1138076
fatcat:yxlya5tmkvc3npjnswj2dohqcq
Anonymous Network Access Using the Digital Marketplace
2006
IEEE Vehicular Technology Conference
With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important. ...
We propose modifications to a novel call-management architecture, the Digital Marketplace, which will break this link, therefore enabling truly anonymous network access. ...
Additionally, even when using anonymous communication schemes, the network operator is in a position to record communications metadata: for example, time of transmission; or in mobile systems, the user's ...
doi:10.1109/vtcf.2006.494
dblp:conf/vtc/McDiarmidI06
fatcat:h7rfrnwrx5glhmawkojqc46hy4
Towards Secure Mobile Multiagent Based Electronic Marketplace Systems
2002
Electronical Notes in Theoretical Computer Science
It rests upon research carried out in the past to develop innovative engineering solutions for architectures based on the paradigm of mobile multi-agents. ...
In this paper we aim at a generic methodology to validate, assess, and construct mobile multi-agent systems in the domain of virtual market places. ...
We propose three major levels for mobile multi-agent systems: the application architecture, the systems design and the computational level. ...
doi:10.1016/s1571-0661(04)80337-2
fatcat:kny4vf4gqzbklblcn7pldy6bim
Building Infrastructure Support for Ubiquitous Context-Aware Systems
[chapter]
2004
Lecture Notes in Computer Science
Many context-aware systems have been demonstrated in lab environments; however, due to some difficulties such as the scalability and privacy issues, they are not yet practical for deployment on a large ...
This paper addresses these two issues with particular interest in user's privacy protection and spontaneous system association. ...
System Architecture We designed a person-centric software architecture in our ACAS project [5], to provide affordable and adaptive support for facilitating mobile users' interactions with services in ubiquitous ...
doi:10.1007/978-3-540-30566-8_61
fatcat:ffhpbf6efjb6pnf3rt7antaoua
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
2013
International Journal of Computer Network and Information Security
This objective is achieved by simulating locally cloak algorithm and globally cloak algorithm for Manhattan mobility model and Waypoint mobility model using NS-2.34 environment. ...
The primary objective of the present work is to develop a system which preserves the location privacy of the concerned individual. ...
The system architecture design for the proposed system is as shown in the Fig.1 . System architecture shown in Fig.1 is executed by using simulation environment NS-2.34. ...
doi:10.5815/ijcnis.2013.01.02
fatcat:6llolktkbnhzjehbezlyhlztpu
« Previous
Showing results 1 — 15 out of 26,715 results