{"title":"基于分布式多代理的用户认证系统体系结构","authors":"A. Kovalcuks","doi":"10.1109/SIMS.2016.19","DOIUrl":null,"url":null,"abstract":"Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition, it allows to create different services based on available authentication functionality, for example: detection of criminals using face or voice recognition functions, authorize public transport ticket just by looking though camera. Commonly, there are many different scenarios where presented architecture can be used.","PeriodicalId":308996,"journal":{"name":"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Distributed Multi-agent-based Architecture for Users Authentication System\",\"authors\":\"A. Kovalcuks\",\"doi\":\"10.1109/SIMS.2016.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition, it allows to create different services based on available authentication functionality, for example: detection of criminals using face or voice recognition functions, authorize public transport ticket just by looking though camera. Commonly, there are many different scenarios where presented architecture can be used.\",\"PeriodicalId\":308996,\"journal\":{\"name\":\"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIMS.2016.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIMS.2016.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Distributed Multi-agent-based Architecture for Users Authentication System
Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition, it allows to create different services based on available authentication functionality, for example: detection of criminals using face or voice recognition functions, authorize public transport ticket just by looking though camera. Commonly, there are many different scenarios where presented architecture can be used.