Nothing Special   »   [go: up one dir, main page]

Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 55))

  • 848 Accesses

Abstract

Nowadays many intranets are deployed without enforcing any network security policy and just relying on security technologies such as firewalls or antivirus. In addition, the number and type of network entities are no longer fixed. Typically, laptops, PDAs or mobile phones need to have access to network resources occasionally. Therefore, it is important to design flexible systems that allow an easy administration of connectivity without compromising security. This article shows how software agents may provide secure configurations to a computer network in a distributed, autonomous and dynamic manner. Thus, here we describe the system architecture of a prototype, the negotiation protocol it uses and how it works in a sample scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Beale, J., Deraison, R., Meer, H., Temmingh, R., Walt, C.V.D.: Nessus Network Auditing. Syngress Publishing (2004)

    Google Scholar 

  2. Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: Jade: A software framework for developing multi-agent applications. lessons learned. Information and Software Technology 50(1-2), 10–21 (2008)

    Article  Google Scholar 

  3. Bishop, M.A.: The Art and Science of Computer Security. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)

    Google Scholar 

  4. FIPA: FIPA ACL Message Structure Specification. FIPA (2001), http://www.fipa.org/specs/fipa00061/

  5. Ioannidis, S., Keromytis, A.D., Bellovin, S.M., Smith, J.M.: Implementing a distributed firewall. In: CCS 2000: Proceedings of the 7th ACM conference on Computer and communications security, pp. 190–199. ACM, New York (2000)

    Chapter  Google Scholar 

  6. Krügel, C., Toth, T., Kirda, E.: Sparta, a mobile agent based instrusion detection system. In: Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security, pp. 187–200. Kluwer, B.V., Deventer (2001)

    Google Scholar 

  7. Udupi, Y.B., Singh, M.P.: Multiagent policy architecture for virtual business organizations. In: Proceedings of the IEEE International Conference on Services Computing, SCC 2006, pp. 44–51. IEEE Computer Society, Washington (2006)

    Chapter  Google Scholar 

  8. Udupi, Y.B., Singh, M.P.: Governance of cross-organizational service agreements: A policy-based approach. In: Proceedings of the 2007 IEEE International Conference on Services Computing, SCC 2007, pp. 36–43. IEEE Computer Society, Salt Lake City (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Martin, P., Orfila, A., Carbo, J. (2009). Negotiation of Network Security Policy by Means of Agents. In: Demazeau, Y., Pavón, J., Corchado, J.M., Bajo, J. (eds) 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009). Advances in Intelligent and Soft Computing, vol 55. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00487-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00487-2_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00486-5

  • Online ISBN: 978-3-642-00487-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics