A Secure Agent Communication Mechanism for Intruder Tracing System |
최진우
(국민대학교 전산과학과)
황선태 (국민대학교 컴퓨터학부) 우종우 (국민대학교 컴퓨터학부) 정주영 (국가보안기술연구소) 최대식 (국가보안기술연구소) |
1 | P. Stone and M. Veloso, 'Multiagent Systems: A Survey from a Machine Learning Perspective,' Technical Report CMU-CS-97-193, School of Computer Science, Carnegie Mellon University, Pittsburg, PA 15213, 1997 |
2 | M. N. Huhns and L. M. Stephens, 'Multi agent Systems and Societies of Agents,' In Multiagents Systems. A Modern Approach to Distributed Artificial Intelligence. Weiss, Gehrard, ed. Cambridge, Mass., MIT Press, pp 79-120, 1999 |
3 | H. Chalupsky, T. Finin, R. Fritzson, D. McKay, S. Shapiro, and G. Weiderhold, 'An overview of KQML: A knowledge query and manipulation language,' Technical report, KQML Advisory Group, April 1992http://www.csee.umbc.edu/kqml/papers/kqmloverview.ps |
4 | N. Bhandaru and W. Croft, 'An architecture for supporting goal-based cooperative work,' In Gibbs S. and Verrijn-Stuart A., eds., Multi-User Interfaces and Applications, pp 337-354, Elsevier Science Publishers B.V., North-Holand, 1990 |
5 | J. C. Corbett, 'The S-expression design language (SEDL),' ICS-TH-93-02, Information and Computer Science Department, University of Hawaii at Manoa, 1993 |
6 | T. Finin, R. Fritzson, D. McKay, and R. McEntire, 'KQML: An information and knowledge exchange protocol,' In K. Funchi and T. Yokoi, editors, Knowledge Building and Knowledge Sharing. Ohmsha and IOS Press, 1994 |
7 | R. Feiertag, C. Kahn, P. Porras, D. Schnackenberg, S. Staniford-Chen, B. Tung, 'A Common Intrusion Specification Language(CISL),' 10 March 2000, http://www.gidos.org/drafts/language.txt |
8 | S. Staniford-Chen, B. Tung, and D. Schnackenberg, 'The Common Intrusion Detection Framework(CIDF),' Position paper accepted to the Informatio Surviv-ability Workshop, Orlando FL, October 1998 |
9 | Asaka, M., Taguchi, A., Goto, A., 'Implementation of IDA: An Intrusion Detection Agent System,' http://www.ipa.go.jp/STC/IDA/paper/first.ps |
10 | J.S.BaJasubramaniyan, J.O.Garcia-Femandez, D.lsacoff, E.Spafford,and D. Zamboni, 'Architecture for Intrusion Detection using Autonomous Agents,' COAST Technical Report, COAST Laboratory, Purdue University, 1998 |
11 | R. Rivest, 'S-expressions,' Internet Draft draft-rivest-sexo-00.txt, 1997 |
12 | C. Thirunavukkarasu, T. Finin, J. Mayfield, 'Secret Agents - A Security Architecture for the KQML Agent Communication Language,' Proc. of CIKM '95 Intelligent Information Agents Workshop, 1995 |
13 | Q. He, K. P. Sycara, 'Personal Security Agent: KQML-Based PKI,' to appear in Autonoumous Agents '98, Mineneapolis/St. Paul, May 10-13, 1998 DOI |
14 | Hando Kim, Min Soo Kim, Yeongho Kim, Suk Ho Kang, 'Design of SKAP(Secure KQML Agent Protocol),' Journal of the Korean Institute of Industrial Engineers(JKIIE), '98 Fall Academic Conference, 1998 |