Skip to main content

Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security
  • 3808 Accesses

Abstract

A basis for agent computing with intelligent languages and crypto-signatures trees is presented with applications to WWW interfaces. We present intelligent syntax and put forth intelligent tree computing. Multiagent signatures are defined and applied to define the basis for tree information-theoretic computing and agent cyberspace applications. The project is applicable to design multiagent protocol and has been applied to put forth cryptosignatures. The project has further led to foundations to computing with intelligent trees. Intelligent game trees are defined with chess playing examples and applications to cyberspace computing. Techniques for generating intelligent models are developed with soundness and completeness theorems abbreviated here with basis in our papers. The models can be applied as a basis to authentication on cyberspace computing. The WWW applications are summed by an authentication proposition. Agent computing has been applied in our papers and colleagues elsewhere to business and cyberspace commerce.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Thompson, B., & King, J. M. (2018). An agent-based modeling framework for cybersecurity in mobile tactical networks - cybersecurity in mobile tactical networks. The Journal of Defense Modeling and Simulation, 15, 205–218.

    Article  Google Scholar 

  2. NATO. (2017). Intelligent autonomous agents for cyber defence and resilience organized by the North Atlantic Treaty Organization (NATO) research group IST-152-RTG. Prague, Czech Republic, on 18–20 October 2017.

    Google Scholar 

  3. Genesereth, M. R., & Nilsson, N. J. (1987). Logical foundations of artificial intelligence. Burlington, MA: Morgan-Kaufmann.

    MATH  Google Scholar 

  4. Nourani, C. F. (1997). Intelligent Tree Computing, Decision Trees and Soft OOP Tree Computing September 2, 1997 Frontiers in Soft Computing and Decision Systems Papers from the 1997 Fall Symposium, Boston Technical Report FS-97-04 AAAI. www.aaai.org/Press/Reports/Symposia/Fall/fs-97-04.html

  5. Nourani, C. F. (1994). Slalom tree computing - A computing theory for artificial intelligence. AI Communications, 4(4), 207–213. Revised December 1995, December 1996.

    Article  Google Scholar 

  6. Thatcher, J. W., Wagner, E. G., & Wright, J. B. (1978). Data type specification: Parameterization and the power of specification techniques. In Proc. 10th Annual Symposium on Theory of Computing (STOC), San Diego, CA (pp. 119–132). New York, NY: ACM.

    Google Scholar 

  7. Nourani, C. F., & Fähndrich, J. (2015, August). A formal approach to agent planning with inference trees. Trieste: NAEC.

    Google Scholar 

  8. Nourani, C. F. (1991). Planning and plausible reasoning in AI. In Proc. Scandinavian Conference in AI, May 1991, Denmark (pp. 150–157). IOS Press.

    Google Scholar 

  9. Nourani, C. F. (1995). Free proof trees, model-theoretic planning and nondeterministic algebraic plan computation with G-diagrams. Sheffield, UK: AISB.

    Google Scholar 

  10. Goguen, J. A., Thatcher, J. W., Wagner, E. G., & Wright, J. B. (1973). A junction between computer science and category theory (Parts I and II) (N.Y. research report, RC4526). Yorktown Heights, NY: IBM T. J. Watson Research Center.

    Google Scholar 

  11. Nourani, C. F. (2004). Intelligent tree computing, cryptosignatures and cyberspace interfaces (ICAI-02). Monte Carlo Resort, Las Vegas, NV: CSREA Press.

    Google Scholar 

  12. Nourani, C. F. (2017). A new cryptosignature block chain protocol algorithm (Technical report on research gate).

    Google Scholar 

  13. Nourani, C. F. (1996). Cyberdocking. A business plan on a venture sent Microsoft.

    Google Scholar 

  14. Nourani, C. F. (1997). Intelligent languages. A preliminary syntactic theory. In A. Kelemenová (Eds.) Proceedings of the Mathematical Foundations CS’98 Satellite Workshop on Grammar Systems. Silesian University, Faculty of Philosophy and Sciences.

    Google Scholar 

  15. Nourani, C. F. (1999). Agent computing, KB for intelligent forecasting, and model discovery for knowledge management, June 1998. In AAAI Workshop on Agent Based Systems in the Business Context Orlando, Florida, July 1999 (AAAI Press technical report WS-99-01).

    Google Scholar 

  16. Nourani, C. F. (1997). Modelling, validation, and hybrid design of intelligent systems February 5, 1997 KMEL98, Karlsruhe, Germany, January 1998. In 8th Workshop Knowledge Engineering Methods and Languages. Institut fur Angewandte Informatik und formal Beschreibungsverfhrn, Karlsruhe University, Germany, January 1998.

    Google Scholar 

  17. Brazier, F. M. T., Dunin-Keplicz, B. M., Jennings, N. R., & Treur, J. (1997). DESIRE: Modeling multi-agent systems in a compositional formal framework. International Journal of Cooperative Information Systems, 6(1), 67–94.

    Article  Google Scholar 

  18. Nourani, C. F. (2003). A sound and complete agent logic paradigm, 2000. In Parts and Abstract Published at ASL, and FSS, AAAI Symposium 2003.

    Google Scholar 

  19. Brazier, F. M. T., Jonker, C. M., & Treur, J. (1997). Formalization of a cooperation model based on joint intentions. In Lecture notes in computer science (Vol. 1193, pp. 141–155). Berlin: Springer.

    Google Scholar 

  20. Nourani, C. F., & Schulte, O. (2013). Multiagent decision trees, competitive models, and goal satisfiability. Ostrava, Czech Republic: DICTAP.

    Google Scholar 

  21. ACM. (1998). The mobile object papers, ACM October 98 (vol 41, no. 10).

    Google Scholar 

  22. Nourani, C. F. (1992). A multi-agent AI approach to fault free and fault tolerant AI, FLAIRS-93. In D. D. Dankell II, (Eds.) Proc. Florida AI Symposium, April 18 1993, Florida. Florida Artificial Intelligence Research Symposium. St. Petersburg, FL: Florida Research Society.

    Google Scholar 

  23. Nilsson, N. J. (1969). Searching, problem solving, and game-playing trees for minimal cost solutions. In A. J. Morell (Ed.) IFIP 1968, Amsterdam, North-Holland (Vol 2, pp. 1556-1562).

    Google Scholar 

  24. Gale, D., & Stewart, F. M. Infinite games with perfect information. In: Contributions to the theory of games, annals of mathematical studies, vol. 28, Princeton.

    Google Scholar 

  25. Nourani, C. F. (1998). Intelligent trees, thought models, and intelligent discovery: Model based reasoning in scientific discovery (MBR’98), Pavia, Italy, December 17–19, 1998.

    Google Scholar 

  26. Cardenas, A., & Crispo, B. (2016). Cyber-physical security and privacy. In: IEEE internet computing, vol. 20, no. 5. Intelligent Cybersecurity Agents [Guest editors' introduction] - IEEE Journals & Magazine. https://ieeexplore.ieee.org/document/75793973/7

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. F. Nourani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nourani, C.F. (2020). Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics