Paper Title:
Communication Security in MAS with XML Security Specifications
  Abstract

With widely applications of Multi-Agent System (MAS) on internet and intranet, how to ensure security regarding multi-agent communication is a big issue. Traditional cryptographic technologies support a coarse granularity security. This paper adopts XML security technology to provide a security mechanism for MAS communication. With the combination of XML security specifications and MAS, the paper presents a fine-grained security model for MAS communication. The model proposed can satisfy the security requirements of MAS communication based on XML data format.

  Info
Periodical
Edited by
Zhenyu Du and Bin Liu
Pages
251-254
DOI
10.4028/www.scientific.net/AMM.65.251
Citation
B. Sun, H. Chen, "Communication Security in MAS with XML Security Specifications", Applied Mechanics and Materials, Vol. 65, pp. 251-254, 2011
Online since
June 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jian Hong Zhang, Xue Liu, Cheng Lian Liu
Abstract:Multi-authenticated encryption scheme is message transmission scheme, which sends message in a secure and authentic way, and allows a group...
111
Authors: Zhong Qi Duan, Xiao Feng Xue
Abstract:In the old days of the mainframe, information was centralized so security was not as big an issue. Nowadays, with the advent of information...
531
Authors: Cong Chen
Chapter 3: Active Materials, Mechanics and Behavior
Abstract:The ubiquitous network and it provides the high quality wireless service, all depends on the wireless communication system network security...
297
Authors: Chun Ying Gu, Rui Ying Fang
Chapter 6: Communication and Network
Abstract:Currently, Email is one of the most popular applications in people’s life. A secure email requires that the email system can provide...
1075
  | Authors: Zhen Liu Zhou
Chapter 3: Hardware, Information Technology and System
Abstract:Personal and network encryption application models nowadays are analyzed in this paper, then a team secrecy encryption application model is...
339