By Topic

An agent-based user-authentication system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
R. Ghanea-Hercock ; tBTexact Technol., Ipswich, UK

Managing the necessary public and private keys in a large organization is a serious challenge. Software agents can be an adaptive and responsive mechanism for managing users trying to connect to network resources. BTexact Technologies Intelligent Systems Laboratory has developed the Phobos agent architecture. Phobos uses a distributed team of cooperative autonomous agents to collectively authenticate user access requests. The advantages are that the agents can query multiple information sources to select the level of trust to delegate to a user and that n agents must concur to authenticate the user, hence increasing overall security. Phobos provides numerous security services to automate user authentication and trust-management processes.

Published in:

IEEE Intelligent Systems  (Volume:18 ,  Issue: 3 )