Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 1438))
Included in the following conference series:
122Accesses
Abstract
PKI (Public Key Infrastructure) is fundamental for many security applications on the network. However, there are so many different kinds of PKI at current stage and they are not compatible. To solve the problem, we propose to implement the authority of authentication verification service systems as personal autonomous software agents, called security agents. In this paper, we introduce its concept and architecture, as well as its communication language, which is needed for public key management and secure communications among security agents and application agents.
This is a preview of subscription content,log in via an institution to check access.
Preview
Unable to display preview. Download preview PDF.
References
W. Timothy Polk, Donna F. Dodson, etc,Public Key Infrastructure: From Theory to Implementation, http://csrc.ncsl.nist.gov/pki/panel/overview.html, NIST.
URL,Public-Key Infrastructure (X.509) (pkix), http://www.ietf.org/html.charters/pkix-charter.html
URL,RSA Laboratories, PKCS (Public Key Crypto System) http://www.rsa.com/rsalabs/pubs/PKCS/
Philip R. Zimmermann,The Official PGP User's Guide MIT Press 1995.
Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, Tatu Ylonen,Simple Public Key Certificate, http://www.clark.net/pub/cme/spki.txt
Ronald L. Rivest, Butler Lampson,SDSI — A Simple Distributed Security Infrastructure, http://theory.lcs.mit.edu/ cis/sdsi.html
Matt Blaze, Joan Feigenbaum, Jack Lacy,Decentralized Trust Management, In Proceedings 1996 IEEE Symposium on Security and Privacy, May, 1996.
Tim Finin, James Mayfield, Chelliah Thirunavukkarasu,Secret Agents — A Security Architecture for the KQML Agent Communication Language, CIKM'95 Intelligent Information Agents Workshop, Baltimore, December 1995.
Leonard N. Foner,A Security Architecture for Multi-Agent Matchmaking, Proceeding of Second International Conference on Multi-Agent System, Mario Tokoro, 1996.
Tim Finin, Yannis Labrou, and James Mayfield,KQML as an agent communication language, in Jeff Bradshaw (Ed.), “Software Agents”, MIT Press, Cambridge (1997).
Sycara, K., Decker, K, Pannu, A., Williamson, M and Zeng, D.,Distributed Intelligent Agents, IEEE Expert, pp.36–45, December 1996.
Qi He, Katia P. Sycara, and Timothy W. Finin,Personal Security Agent: KQML-Based PKI, to appear in Autonomous Agents'98, Minneapolis/St. Paul, May 10–13, 1998.
R. Anderson and R. NeedhamRobustness Principles for Public Key Protocols,Lecture Notes on Computer Science, 963:236–247, 1995.
Author information
Authors and Affiliations
The Robotics Institute, Carnegie Mellon University, 15213, Pittsburgh, PA, USA
Qi He & Katia Sycara
Dept. of CS and Telecommunications, University of Missouri-Kansas, 64110, City Kansas, MO, USA
Zhongmin Su
- Qi He
You can also search for this author inPubMed Google Scholar
- Katia Sycara
You can also search for this author inPubMed Google Scholar
- Zhongmin Su
You can also search for this author inPubMed Google Scholar
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
He, Q., Sycara, K., Su, Z. (1998). A solution to open standard of PKI. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053725
Download citation
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative