메뉴 건너뛰기




Volumn 31, Issue 5, 2009, Pages 913-930

An extended JADE-S based framework for developing secure Multi-Agent Systems

Author keywords

Biometric Authentication; e Banking System; FPGA Prototyping; JADE S; MAS Security; Multi Agent Systems (MASs)

Indexed keywords

BIOMETRIC AUTHENTICATION; E-BANKING SYSTEM; FPGA PROTOTYPING; JADE-S; MAS SECURITY; MULTI-AGENT SYSTEMS (MASS);

EID: 67349158268     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.03.017     Document Type: Article
Times cited : (30)

References (49)
  • 3
    • 0003074644 scopus 로고    scopus 로고
    • Bellifemine, Agostino Poggi, Giovanni Rimassa, JADE-A FIPA-compliant agent framework CSELT internal technical report
    • London, April
    • Fabio Bellifemine, Agostino Poggi, Giovanni Rimassa, JADE-A FIPA-compliant agent framework CSELT internal technical report. Part of this report has been also published in Proceedings of PAAM'99, London, April 1999, pp.97-108.
    • (1999) Part of this report has been also published in Proceedings of PAAM , vol.99 , pp. 97-108
    • Fabio1
  • 4
    • 84867464826 scopus 로고    scopus 로고
    • Developing multi-agent systems with JADE
    • Proc. of the 7th International Workshop on Intelligent Agent. Theories, Architectures and Languages ATAL-2000, ISBN 3-540-42422-9, Springer
    • F. Bellifemine, A. Poggi, G. Rimassa, Developing multi-agent systems with JADE, Proc. of the 7th International Workshop on Intelligent Agent. Theories, Architectures and Languages (ATAL-2000), LNCS, vol. 1986, pp. 89-103, ISBN 3-540-42422-9, Springer.
    • LNCS , vol.1986 , pp. 89-103
    • Bellifemine, F.1    Poggi, A.2    Rimassa, G.3
  • 6
    • 0035250438 scopus 로고    scopus 로고
    • Developing multi-agent systems with a FIPA-compliant agent framework
    • no. 31
    • Bellifemine F., Poggi A., and Rimassa G. Developing multi-agent systems with a FIPA-compliant agent framework. Software-Practice And Experience (2001) 103-128 no. 31
    • (2001) Software-Practice And Experience , pp. 103-128
    • Bellifemine, F.1    Poggi, A.2    Rimassa, G.3
  • 7
    • 8344273490 scopus 로고    scopus 로고
    • Communication security in multi-agent systems
    • Mařík V.V., et al. (Ed), Springer-Verlag, Berlin Heidelberg 2003
    • Novák P., Rollo M., Hodík J., and Vlcek T. Communication security in multi-agent systems. In: Mařík V.V., et al. (Ed). CEEMAS 2003, LNAI 2691 (2003), Springer-Verlag, Berlin Heidelberg 454-463 2003
    • (2003) CEEMAS 2003, LNAI 2691 , pp. 454-463
    • Novák, P.1    Rollo, M.2    Hodík, J.3    Vlcek, T.4
  • 15
    • 33751538536 scopus 로고    scopus 로고
    • Cougaar: a robust configurable multi agent platform
    • 0-7803-8870-4
    • Helsinger A., and Wright T. Cougaar: a robust configurable multi agent platform. Proc. of IEEE Conference Aerospace (March 5-12 2005). 0-7803-8870-4 1-10
    • (2005) Proc. of IEEE Conference Aerospace , pp. 1-10
    • Helsinger, A.1    Wright, T.2
  • 17
    • 0000884365 scopus 로고    scopus 로고
    • A fingerprint verification system based on triangular matching and dynamic time warping
    • Zsolt M., and Kovacs V. A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Transaction on Pattern Analysis and Machine Intelligence 22 11 (2000) 1266-1276
    • (2000) IEEE Transaction on Pattern Analysis and Machine Intelligence , vol.22 , Issue.11 , pp. 1266-1276
    • Zsolt, M.1    Kovacs, V.2
  • 21
    • 33744965279 scopus 로고    scopus 로고
    • Verification of ink-on-paper fingerprints by using image processing techniques and a new matching operator
    • Conti V., Pilato G., Vitabile S., and Sorbello F. Verification of ink-on-paper fingerprints by using image processing techniques and a new matching operator. AI*IA Siena (September 10-13 2002) 594-601
    • (2002) AI*IA Siena , pp. 594-601
    • Conti, V.1    Pilato, G.2    Vitabile, S.3    Sorbello, F.4
  • 22
    • 27944492919 scopus 로고    scopus 로고
    • ThumbPod puts security under your thumb
    • October, Winter, EE Department, UCLA
    • Patrick Schaumont, Ingrid Verbauwhede-"ThumbPod puts security under your thumb", Xilinx Xcell Journal, October 2003 (Winter 2004), EE Department, UCLA.
    • (2003) Xilinx Xcell Journal
    • Schaumont, P.1    Verbauwhede-, I.2
  • 24
    • 50249129537 scopus 로고    scopus 로고
    • An Embedded Fingerprint Recognizer
    • Z. Shao, Y. Zhang, and L. T. Yang Editors, Chapter 24, ISBN: 1-58883-112-4, American Scientific Publishers, in press
    • S. Vitabile, V. Conti, F. Sorbello, "An Embedded Fingerprint Recognizer", in Embedded Systems: Status and Perspective, Z. Shao, Y. Zhang, and L. T. Yang Editors, Chapter 24, ISBN: 1-58883-112-4, American Scientific Publishers, in press.
    • Embedded Systems: Status and Perspective
    • Vitabile, S.1    Conti, V.2    Sorbello, F.3
  • 26
    • 85041439566 scopus 로고    scopus 로고
    • Principles of trust for MAS: cognitive anatomy, social importance, and quantification
    • Castelfranchi C., and Falcone R. Principles of trust for MAS: cognitive anatomy, social importance, and quantification. Proc. of ICMAS-98 (1998) 72-79
    • (1998) Proc. of ICMAS-98 , pp. 72-79
    • Castelfranchi, C.1    Falcone, R.2
  • 27
    • 0034275135 scopus 로고    scopus 로고
    • Responsible behavior for networked agents - a distributed computing perspective
    • E. Mamdani, J. Pitt, Responsible behavior for networked agents - a distributed computing perspective, IEEE Internet Computing 4 (5) (2000) 27-31.
    • (2000) IEEE Internet Computing , vol.4 , Issue.5 , pp. 27-31
    • Mamdani, E.1    Pitt, J.2
  • 30
    • 67349102219 scopus 로고    scopus 로고
    • http://web.mit.edu/kerberos. Last access 05/07/2008.
    • http://web.mit.edu/kerberos. Last access 05/07/2008.
  • 31
    • 67349219324 scopus 로고    scopus 로고
    • http://www.ibm.com. Last access 05/07/2008.
    • http://www.ibm.com. Last access 05/07/2008.
  • 32
    • 67349285315 scopus 로고    scopus 로고
    • http://www.dec.com. Last access 05/07/2008.
    • http://www.dec.com. Last access 05/07/2008.
  • 35
    • 0034809453 scopus 로고    scopus 로고
    • N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, 40, no. 3.x, 2001.
    • N.K. Ratha, J.H. Connell, R.M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, vol. 40, no. 3.x, 2001.
  • 39
  • 41
    • 67349259541 scopus 로고    scopus 로고
    • FIPA home page, URL: http://www.fipa.org. Last access 05/07/2008.
    • FIPA home page, URL: http://www.fipa.org. Last access 05/07/2008.
  • 43
    • 67349085691 scopus 로고    scopus 로고
    • Thomas J. Watson Jr., The Considerations of Data Security in a Computer Environment, IBM (Hrgs.), 1968 04 05, IBM, ISBN/Best-Nr: G520-2169-00.
    • Thomas J. Watson Jr., The Considerations of Data Security in a Computer Environment, IBM (Hrgs.), 1968 04 05, IBM, ISBN/Best-Nr: G520-2169-00.
  • 46
    • 67349088957 scopus 로고    scopus 로고
    • URL: http://www.celoxica.com. Last access 05/07/2008.
    • URL: http://www.celoxica.com. Last access 05/07/2008.
  • 47
    • 67349230785 scopus 로고    scopus 로고
    • URL: http://www.precisebiometrics.com. Last access 05/07/2008.
    • URL: http://www.precisebiometrics.com. Last access 05/07/2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.