{"title":"An access control model based on distributed knowledge management","authors":"A. Seleznyov, S. Hailes","doi":"10.1109/AINA.2004.1283832","DOIUrl":null,"url":null,"abstract":"The conceptual architecture of the access control system described here is based on automatic distributed acquisition and processing of knowledge about users and devices in computer networks. It uses autonomous agents for distributed knowledge management. Agents grouped into distributed communities act as mediators between users/devices and network resources. Communicating with each other, they make decisions about whether a certain user or device can be given access to a requested resource. In other words, agents in our system perform user/device authentication, authorisation, and maintenance of user credentials.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2004.1283832","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
The conceptual architecture of the access control system described here is based on automatic distributed acquisition and processing of knowledge about users and devices in computer networks. It uses autonomous agents for distributed knowledge management. Agents grouped into distributed communities act as mediators between users/devices and network resources. Communicating with each other, they make decisions about whether a certain user or device can be given access to a requested resource. In other words, agents in our system perform user/device authentication, authorisation, and maintenance of user credentials.