{"title":"The Distributed Multi-agent-based Architecture for Users Authentication System","authors":"A. Kovalcuks","doi":"10.1109/SIMS.2016.19","DOIUrl":null,"url":null,"abstract":"Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition, it allows to create different services based on available authentication functionality, for example: detection of criminals using face or voice recognition functions, authorize public transport ticket just by looking though camera. Commonly, there are many different scenarios where presented architecture can be used.","PeriodicalId":308996,"journal":{"name":"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIMS.2016.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition, it allows to create different services based on available authentication functionality, for example: detection of criminals using face or voice recognition functions, authorize public transport ticket just by looking though camera. Commonly, there are many different scenarios where presented architecture can be used.