Skip to main content

Multi-domain Public Key Infrastructure for Information Security with Use of a Multi-Agent System

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7802))

Included in the following conference series:

Abstract

We propose a multi-agent based common framework for interoperability among CAs (Certificate Authorities) from multiple PKI (Public Key Infrastructure) domains to build trust and secure for electronic transactions. Most of the countries recognize PKI as a powerful technique for security services and implemented their own PKI for online user. Several trust models have been used in PKI, and achieving interoperability between them is a major issue which requires recognition of certificates from different domains in order to perform transactions confidently in a cross border application. In our system, User Agent, Trust Agent and Management Agent are created. These software agents co-operate each other for user authentication and authorization processes autonomously in multiple PKI domains within the ASEAN region to encourage the recognition of digital signature to enhance regional market. Our system intended to facilitate not only for matured e-commerce but also for individual start up entrepreneur for secure trading by taking into consideration of regional needs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, C., Lloyd, S.: Understanding PKI: Concept, Standards, and Deployment Considerations, 2nd edn. Addison-Wesley (2002)

    Google Scholar 

  2. More, V.N.: Authentication and Authorization Models. International Journal of Computer Science and Security (IJCSS) 5(1), 72–84 (2011)

    MathSciNet  Google Scholar 

  3. Zhou, H.Q., Dai, S.H.: PKI-based E-Business Security System. In: The 3rd International Conference on Innovative Computing Information and Control, ICICIC 2008 (2008)

    Google Scholar 

  4. Liping, H., Lei, S.: Research on Trust Model of PKI. In: Fourth International Conference on Intelligent Computation Technology and Automation, pp. 232–235 (2011)

    Google Scholar 

  5. Achieving PKI Interoperability, Results of the JKS-IWG Interoperability project, Japan PKI Forum, Korea PKI Forum, PKI Forum Singapore (2002)

    Google Scholar 

  6. Lloyd, S., Fillingham, D., Lampard, R., Orlowski, S., Weigelt, J.: CA-CA Interoperability, White Paper (March 2001)

    Google Scholar 

  7. Guo, Z., Okuyama, T., Marion Jr., R.F.: A New Trust Model for PKI Interoperability. In: Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services, ICAS/ICNS 2005 (2005)

    Google Scholar 

  8. Finin, T., Fritzson, R., McKay, D., McEntire, R.: KQML as an agent communication language. In: Proceedings of the Third International Conference on Information and Knowledge Management, CIKM 1994, pp. 456–463 (1994)

    Google Scholar 

  9. He, Q., Sycara, K.P., Finin, T.W.: Personal Security Agent: KQML-based PKI. In: Proceedings of the Second International Conference on Autonomous Agents, AGENTS 1998, pp. 377–384 (1998)

    Google Scholar 

  10. Hu, Y.J., Tang, C.W.: Agent-Oriented Public Key Infrastructure for Multi-Agent E-service. In: Palade, V., Howlett, R.J., Jain, L. C. (eds.) KES 2003. LNCS, vol. 2773, pp. 1215–1221. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Hu, Y.J.: Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management. Electronic Commerce Research 3, 221–243 (2003)

    Article  Google Scholar 

  12. Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: Multi-Application Authentication based on Multi-Agent System. IAENG International Journal of Computer Science J 33(2), 1316–1321 (2007)

    Google Scholar 

  13. Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: A Robust Sign-On Model based on Multi-Agent System and PKI. In: Proceedings of the Sixth International Conference on Networking, ICN 2007 (2007)

    Google Scholar 

  14. Randy, C.M., Joseph, G.T.: E-Commerce Security Issues. In: Proceedings of the 35th Hawaii International Conference on System Sciences (2002)

    Google Scholar 

  15. Zhang, Z., Zhang, C.: Basics of Agents and Multi-agent Systems. In: Zhang, Z., Zhang, C. (eds.) Agent-Based Hybrid Intelligent Systems. LNCS (LNAI), vol. 2938, pp. 29–39. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Yannis, L., Finin, T., Yun, P.: Agent Communication Languages: The Current Land-scape. IEEE Intelligent System 14(2), 45–52 (1999)

    Article  Google Scholar 

  17. Foundation for Intelligent Physical Agents: FIPA specifications, http://www.fipa.org/ (accessed October 31, 2012)

  18. Shimaoka, M., Hastings, N., Nielsen, R.: Network Working Group Request for Comments: 5217 Category: Informational, http://www.ietf.org/rfc/rfc5217.txt (accessed November 1, 2012)

  19. Perlman, R.: An Overview of PKI Trust Models. IEEE Network, 38–43 (November/December 1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aye, N. et al. (2013). Multi-domain Public Key Infrastructure for Information Security with Use of a Multi-Agent System. In: Selamat, A., Nguyen, N.T., Haron, H. (eds) Intelligent Information and Database Systems. ACIIDS 2013. Lecture Notes in Computer Science(), vol 7802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36546-1_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36546-1_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36545-4

  • Online ISBN: 978-3-642-36546-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics