This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Phobos: An Agent-Based User Authentication System
May/June 2003 (vol. 18 no. 3)
pp. 67-73
Robert Ghanea-Hercock, BTexact Technologies

Creating confidential data via encryption is now a trivial task; however, managing the necessary public and private keys in a large organization is a serious challenge. Software agents can be an adaptive, responsive mechanism for managing client authentication and maintaining user credentials. By using a distributed community of software agents, we can match the growth in the software and hardware we seek to protect. Also, if these agents act collaboratively to distribute solutions to security violations, we can construct a rapid, scaleable defense mechanism. The prototype Phobos agent architecture offers such a solution to the authentication problem. It provides a number of security services with the goal of automating user authentication and trust management. In particular, the agents should handle all password, key, and certificate management. Phobos therefore provides a multiparty authentication service.

Index Terms:
security, authentication, multi-agent systems
Citation:
Robert Ghanea-Hercock, "Phobos: An Agent-Based User Authentication System," IEEE Intelligent Systems, vol. 18, no. 3, pp. 67-73, May-June 2003, doi:10.1109/MIS.2003.1200732
Usage of this product signifies your acceptance of the Terms of Use.