Skip to main content

Design of the Architecture for Agent of the Personality Security in the Ubiquitous Environment

  • Conference paper
Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4953))

Abstract

Many programs are exposed a threat in the ubiquitous system. In the result, we are attacked and discharge personal information from the many factors. When executing the various application programs of a computer generally or connecting with a specific site through the Internet A place with many examples into which carry out a user and the user-identification child (ID) and the password are made to enter in order to check a user’s identity, If in agreement as compared with the identifier which a user inputs, ID which had the password registered, and a password, the authority to perform an applicable program, and the authority to use the various contents of an applicable site will be granted to the user. In this paper is provided the design of the user identification method in the ubiquitous environment. Also, We are make use of grid computing between host and targets. Therefore, This system is provide for the flexibility in the heterogeneous system.

In this paper of data was provided by PassHUB CO.,LTD. This work was supported by the Korea Research Foundation Grant funded by Government (MOEHRD) (KRF-2006-0050J03803).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pressman, R.S.: Software Engineering. Mcgraw-hill international edition, New York (1997)

    MATH  Google Scholar 

  2. Luger, G.F.: Artificial intelligence. Addison-Wesley, Reading (2001)

    Google Scholar 

  3. Beigl, M., Gellersen, H.W., Schmidt, A.: MediaCups: Experience with Design and Use of Computer-Augmented Everyday Object. Computer Networks (May 2001)

    Google Scholar 

  4. Ponnekanti, S.R., et al.: ICrafter: A Service Framework for Ubiquitous Computing Environment. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Feeney, L., Ahlgren, B., Westerlund, A.: Spontaneous Networking: An Application oriented Approach to Ad Hoc Networking. IEEE Comm. Magazine (June 2001)

    Google Scholar 

  6. Lee, E.-S., Hwang, S.-M.: Definition of Security Requirement Items and Its Process to Security and Progress Management, LNCIS, vol. 344 (August 2006)

    Google Scholar 

  7. Lee, E.-S., Hwang, S.-M.: Design Implementation of Web Security Access Control System for Semantic Web Ontoloty. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, Springer, Heidelberg (2005)

    Google Scholar 

  8. Lee, E.-S., Lee, M.: Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement, LNCIS, vol. 344 (August 2006)

    Google Scholar 

  9. Lee, E.-S., Lee, S.-H.: Design progress management for Security Requirements in Ubiqiiuous computing using COQUALMO. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, Springer, Heidelberg (2006)

    Google Scholar 

  10. Cho, N.-d., Lee, E.-S.: Design and Implementation of Semantic Web Search System using Ontology and Anchor Text. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. ISO/IEC 15408-1:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model

    Google Scholar 

  12. ISO. ISO/IEC 15408-2:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements

    Google Scholar 

  13. ISO. ISO/IEC 15408-3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements

    Google Scholar 

  14. Saba, D., Mukberjee, A.: Pervasive computing a paradigm for the 21st century. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  15. Weiser, M.: Some comuter science issues in ubiquitous comuting. IEEE Computer Society Press, Los Alamitos (1993)

    Google Scholar 

  16. Kindgerg, T.: System software for ubiquitous computing. IEEE Computer (2002)

    Google Scholar 

  17. Foster, I., Kesselman, C.: The Grid: blueprint for a new computing infrastructure. Morgan Kaufmann Publishers Inc., San Francisco (1998)

    Google Scholar 

  18. Abbas, A.: Grid Computing: Practical Guide To Technology & Applications. Charles River Media (2003)

    Google Scholar 

  19. Foster, I., Kesselman, C., Tuecke, C.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of High Performance Computing Applications 15(3), 200–222 (2001)

    Article  Google Scholar 

  20. Foster, I.: What is the Grid? A Three Point Checklist. Grid Today 1(6) (July 22, 2002), http://www.gridtoday.com/02/0722/100136.html

  21. Lee, E.-S., Kim, H.-K., Lee, S.H.: Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 581–588. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ngoc Thanh Nguyen Geun Sik Jo Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, ES., Lee, S.H. (2008). Design of the Architecture for Agent of the Personality Security in the Ubiquitous Environment. In: Nguyen, N.T., Jo, G.S., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2008. Lecture Notes in Computer Science(), vol 4953. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78582-8_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78582-8_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78581-1

  • Online ISBN: 978-3-540-78582-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics