首页> 外文会议>National Conference on Artificial Intelligence >An agent approach to security in pervasive environments
【24h】

An agent approach to security in pervasive environments

机译:普遍存在环境中的代理方法

获取原文

摘要

Information technology is slowly becoming invisible and will eventually be completely integrated into the environment. Computers will soon become part of a network, connecting all devices from lamps, projectors, and printers to laptops, PDAs and cellphones. The number of computationally enabled devices will increase exponentially and people will be able to access these resources and perform computing operations anytime, and anywhere, through this integrated network known as ubiquitous/pervasive computing (Weiser 1991) (Satyanarayanan 2001). In these loosely coupled, highly dynamic environments, users will be able to move around and still be connected to this network of resources, which themselves will be constantly changing. As resources will be mutable, frequently changing their parameters like location, functionality, interoperability, accessing them uniformly will be difficult. Users will also be dynamic; moving in and out of range, using different devices for accessing the environment, and using different identities. Traditionally, stand-alone computers and small networks rely on user authentication and access control to provide security. These physical methods use system-based controls to verify the identity of a person or process, explicitly enabling or restricting the ability to use, change, or view a computer resource. However the existing security mechanisms fail to meet the requirements of pervasive systems, which include authenticating foreign users and providing authorization to a large number of entities in the absence of a central control or repository. Our research proposes to model pervasive systems using agent technologies and to use principles of distributed trust management as an alternative to traditional authentication and access control schemes.
机译:信息技术逐渐变得看不见,最终将完全融入环境中。计算机即将成为网络的一部分,将所有设备从灯泡,投影仪和打印机连接到笔记本电脑,PDA和手机。计算支持的设备的数量将呈指数级增长,人们将能够随时随地访问这些资源,并通过该集成网络称为普通/普遍计算(WEISER 1991)(Satyanarayanan 2001)。在这些松散耦合的,高度动态的环境中,用户将能够移动,仍然连接到该资源网络,本身将不断变化。随着资源将是可变的,频繁地改变它们的参数,如位置,功能,互操作性,均匀地访问它们将是困难的。用户也将是动态的;使用不同的设备访问和超出范围,用于访问环境,并使用不同的身份。传统上,独立计算机和小型网络依赖于用户身份验证和访问控制来提供安全性。这些物理方法使用基于系统的控件来验证人或过程的身份,明确启用或限制使用,更改或查看计算机资源的能力。然而,现有的安全机制未能满足普及系统的要求,包括验证国外用户并在不存在中央控制或存储库的情况下向大量实体提供授权。我们的研究建议使用代理技术模拟普遍存器系统,并使用分布式信任管理原理作为传统认证和访问控制方案的替代方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号