DOC PREVIEW
UCCS CS 6910 - Secured Distributed Multi- Agent Role Based Access Control

This preview shows page 1-2-14-15-29-30 out of 30 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 30 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 30 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 30 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 30 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 30 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 30 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 30 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1IntroductionIntroductionIntroductionSurvey of related worksSurvey of related worksSystem ArchitectureSystem ArchitectureSystem ArchitectureSystem ArchitectureSystem ArchitectureSystem ArchitectureSystem ArchitectureSystem ArchitectureSystem ArchitectureSystem ArchitectureSystem ArchitectureSystem ArchitectureExperimentation and ResultsResultsResultsResultsResultsResultsResultsResultsResultsConclusion and Future WorkConclusion and Future WorkSlide 30Secured Distributed Multi-Agent Role Based AccessControlFawaz AlsaadiFahad AlsolmaiIntroductionRole Based Multi-Agent System for providing effective and secure Bank transaction servicesTo provide seamless access to information present in the databaseNegotiation agent to access and trust negotiations, Database agentInterface Agent to accept and display request service results.7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 2IntroductionMain Features of the systemEase of use, Effective communication between customers and service providers,Isolation from resource specific details, changes in the system and internal complexity7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 3IntroductionAgents developed using Java AgentDevelopment Framework (JADE) Java APIsSystem provides features such as The Login Validation or User AuthenticationService Registration,Role Agent Identification, and User Interface for an effective interaction between customer and the system. The role agent retrieves the information from database and sends it to the customer through an interface agent.7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 4Survey of related worksAurora Vizcanaino et al [1] proposed a multi-agent model which is suitable for developing a generalized knowledge management systemC.VGoldman et.al Suggested a decentralized collaborative multi-agent communication model and mechanism design based on Markov Decision Process (MDP)Assumed that agents are full-synchronized when they start operatingNo specific optimal algorithm is presentedNo experimental results showing their algorithm can work on large team7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 5Survey of related worksFabio Belliemine presented a framework for team coordination under incomplete information based on the incomplete information game theory that agents can learn and share their estimates with each other. Uses a probability method to coordinate agent team without explicit communication by observing teammates’ action and coordinating their activities via individual and group plan inference7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 6System ArchitectureSystem accepts the customer request by interface agent.The facilitator is used to register the service of role agents. The role agent has the ability to forward the request to negotiator for the validation of request and account details. 7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 7System ArchitectureThe database agent possesses the capacity to retrieve the customer information. The interface agent is used to display the customer details.7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 8System ArchitectureUser InterfaceGraphical User InterfaceMobile Agent Creation moduleServer with appropriate resource is identified to process the customer request. Facilitator coordinates the mobile agent to process customer request. Facilitator registers the agent to access a particular service using its Agent ID. After completion of the customer service the facilitator deregisters the service.7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 9System ArchitectureLoan Mobile AgentSystem lists the available bank loan schemes to the customerChecks the customer’s historyIf the customer has sufficient balance, the loan is sanctionedNew loan is not entitled unless the customer pays the previous dues. The customer balance amount gets updated when permitted to avail the loan.7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 10System ArchitectureCredit Card Agent Provides access rights to the customerSends the customer information to interface agent. Interface agent coordinates the Credit Card Agent to register its service with the facilitator. Role of the agent is to process the customer request. The role based agent checks the customer’s earlier due regarding cash or purchase. If customer do not have due then the customer is permitted to use the credit card within the permitted limit. If the customer has dues, credit card payment is barred7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 11System ArchitectureInsurance agent Provides information to all customers about the insurance offers (i.e. access to polices, brochures and price list). Describes the characteristics of different types of insurance and their attributes.7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 12System ArchitecturePayment of Insurance bill1 Electronic bill generation2. Payment order3. Electronic notification for sufficient money4. Electronic notification to Insurance agent5. Verification of money transfer 7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 13System ArchitectureDecision AgentMakes the decision from the role based multiagents with the coordination of a data warehouse.Multi-Agent CommunicationTo achieve the individual objectives or dynamically coordinate the actions, software agents need to interact with one another.Communication is at the basis of agents interactions7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 14System ArchitectureFoundation for Intelligent Physical Agent (FIPA)Specifies standard components that can be usedDetermination of valid sequences of messages called INteraction Protocols (INP) regulating specific interactions to be known by all the interacting entities7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 15System ArchitectureFoundation for Intelligent Physical Agent (FIPA)Agent Communication Language (ACL) ▪Enables the attitudes regarding the content of exchange to be expressed. ▪e.g. whether the content of the communication is, an assertion, a request or some form of query ▪Two most deployed ACL: FIPA-ACL and Knowledge Query Manipulation Language (KQML).7/27/2011 Fawaz Alssadi/Fahad Alsolmai/SDMRBAC 16System ArchitectureFoundation for Intelligent Physical Agent (FIPA)FIPA-SL, Knowledge Interchange Format (KIF) content Languages (CLs) used for describing


View Full Document

UCCS CS 6910 - Secured Distributed Multi- Agent Role Based Access Control

Download Secured Distributed Multi- Agent Role Based Access Control
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Secured Distributed Multi- Agent Role Based Access Control and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Secured Distributed Multi- Agent Role Based Access Control 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?