2012
Authors
Martins, RA; Correia, ME; Augusto, AB;
Publication
INFORMATION SYSTEMS AND TECHNOLOGIES
Abstract
This paper performs a survey on the state of the art in the security and access controls mechanisms employed by multi agent systems as a form of data transaction, with special emphasis on their security threats and how these issues are currently being tackled for multi-agent systems. In this paper we provide a brief summary of current approaches and provide comments on their relevance, implementation and safety assumptions behind their safe operation on real systems with sensitive data. We also take special notice on the security issues approached by each one of the analysed proposals and the sometimes ingenious ways proposed by different authors to solve them. We also pay special attention to issues related with the authentication, confidentiality, integrity and access control mechanisms employed to minimise security incidents. Nowadays multi-agent systems are increasingly being researched and deployed to solve complex interoperability issues that normally occur between different institutions. The final result of this survey is a summary aggregation of knowledge about security and access control practices for multi agent models and implementations.
2009
Authors
Falcao Reis, F; Almeida, D; Correia, ME;
Publication
SISTEMAS E TECHNOLOGIAS DE INFORMACAO: ACTAS DA 4A CONFERENCIA IBERICA DE SISTEMAS E TECNOLOGIAS DE LA INFORMACAO
Abstract
With the massive migration of real world bureaucratic and business processes to the virtual world comes an ever increasing dependency on the security of the Internet infrastructure. To ensure the secure exchange of sensitive personal information and to help support the provisioning of a multitude of identity mechanisms and protocols there is an increased need for a very flexible, interoperable and user-centric Identity Management infrastructure. OpenID is a decentralized system protocol for user-centric identification and digital identity management in the Internet that is being largely deployed all over the world. In this paper we present Extended OpenID (EOID), an Identity Provider which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC). EOID is composed by an OpenID server that uses the CC for strong authentication and a Firefox Plugin for an easier much more secure user experience.
2012
Authors
Maia, LA; Correia, ME;
Publication
SISTEMAS Y TECNOLOGIAS DE INFORMACION, VOLS 1 AND 2
Abstract
The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone nowadays constitutes the full embodiment of the truly personal device users carry constantly with them, everywhere. They are therefore the ideal means by which the user can casually and conveniently interact with Information systems. It can also act as a convenient and highly practical storage place for sensitive identity information. Moreover nowadays there is a real urgent need to have in place secure, non-refutable and securely managed identities and communications, with sufficiently strong authentication mechanisms that can assure, among other important properties, strong non-repudiation. In this paper we describe how we have managed to combine the functionalities provided by OpenSC and the University of Graz IAIK java security provider to more easily port java security applications based on the desktop JCA API to the Android platform. This enables us to take advantage of the full extent of the security programming facilities provided by the Java programming language on android devices equipped with smart digital (SD) based smart cards.
2010
Authors
Antunes, MJ; Correia, ME;
Publication
ADVANCES IN COMPUTATIONAL BIOLOGY
Abstract
This paper presents an artificial immune system (AIS) based on Grossman's tunable activation threshold (TAT) for temporal anomaly detection. We describe the generic AIS framework and the TAT model adopted for simulating T Cells behaviour, emphasizing two novel important features: the temporal dynamic adjustment of T Cells clonal size and its associated homeostasis mechanism. We also present some promising results obtained with artificially generated data sets, aiming to test the appropriateness of using TAT in dynamic changing environments, to distinguish new unseen patterns as part of what should be detected as normal or as anomalous. We conclude by discussing results obtained thus far with artificially generated data sets.
2009
Authors
Antunes, MJ; Correia, ME;
Publication
2009 INTERNATIONAL JOINT CONFERENCE ON BIOINFORMATICS, SYSTEMS BIOLOGY AND INTELLIGENT COMPUTING, PROCEEDINGS
Abstract
This paper presents an Artificial Immune System (AIS) based on Grossman's Tunable Activation Threshold (TAT) for anomaly detection. We describe the immunological metaphor and the algorithm adopted for T-cells, emphasizing two important features: the temporal dynamic adjustment of T-cells clonal size and its associated homeostasis mechanism. We present some promising results obtained with artificially generated data sets, aiming to test the appropriateness of using TAT in dynamic changing environments, to distinguish new unseen patterns as part of what should be detected as normal or as anomalous.
2012
Authors
Antunes, MJ; Correia, ME;
Publication
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Abstract
The Artificial Immune Systems (AIS) constitute an emerging and very promising area of research that historically have been falling within two main theoretical immunological schools of thought: those based on Negative selection (NS) or those inspired on Danger theory (DT). Despite their inherent strengths and well known promising results, both deployed AIS have documented difficulties on dealing with gradual dynamic changes of self behavior through time. In this paper we propose and describe the development of an AIS framework for anomaly detection based on a rather different immunological theory, which is the Grossman's Tunable Activation Thresholds (TAT) theory for the behaviour of T-cells. The overall framework has been tested with artificially generated stochastic data sets based on a real world phenomena and the results thus obtained have been compared with a non-evolutionary Support Vector Machine (SVM) classifier, thus demonstrating TAT's performance and competitiveness for anomaly detection. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.