Abstract
The way to identify user in existing computer systems has for a long time been simple. It is enough to provide correct password (or identity token) and the majority of the systems will “recognize” you as legal user of given username if any. There is no difference for such a system if there is one person behind this username or many. Authentication of the user for many years has been reduced to the problem of the username validation and is not answering question “Is the user really who he/she represents himself to be?” This problem was identified from the very beginning and there were many attempts to solve it, but without success. General idea to overcome this mismatch is to know more about personality of the user. The key concept here is shared information knowledge (between user and the system) that must be unique. This knowledge can be gathered by intelligent software agents. Article describes JADE [1] agents for shared knowledge multi-agent system that can dynamically learn new concepts and perform learned actions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Fabio, B., Giovanni, C., Greenwood, D.: Developing multi-agent systems with JADE. John Wiley & Sons (2007)
Mitnick, K., Simon, W., Wozniak, S.: The art of deception. John Wiley & Sons (2002)
Long, J., Wiles, J.: No Tech Hacking: A Guide to Social Engineering Dumpster Diving and Shoulder Surfing, pp. 101–121. Syngress (2008)
Yan, J., Ahmad, A.: A Low-cost Attack on a Microsoft CAPTCHA. School of Computing Science, Newcastle University, UK (2008)
Magno, M.B.: Survey of user authentication mechanisms. Naval Postgraduate School, Monterey (1996)
Sasse, A.: Usability and trust in information systems. CiteSeerX (2008)
Schneier, B.: Applied cryptography, pp. 52–68. John Wiley & Sons (1996)
Nosseir, A., Connor, R., Dunlop, M.: Internet Authentication Based on Personal History - A Feasibility Test. CiteSeerX (2005)
Nosseir, A., Connor, R., Revie, C., Terzis, S.: Question-based authentication using context data. In: Nordic Conference on Human-Computer Interaction, vol. 189, pp. 429–432 (2006)
Zviran, M., Haga, W.G.: User authentication by cognitive passwords: an empirical assessment. In: Proceedings of the Fifth Jerusalem Conference on Information Technology, pp. 137–144 (1990)
Toomim, M., Zhang, X., Fogarty, J., Landay, J.A.: Access Control by Testing for Shared Knowledge. In: Conference on Human Factors in Computing Systems (2008)
Forman, I., Forman, N.: Java reflection in action. Manning Publications (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kimlaychuk, V. (2013). Authentication Using Shared Knowledge: Learning Agents. In: Lee, S., Cho, H., Yoon, KJ., Lee, J. (eds) Intelligent Autonomous Systems 12. Advances in Intelligent Systems and Computing, vol 194. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33932-5_48
Download citation
DOI: https://doi.org/10.1007/978-3-642-33932-5_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33931-8
Online ISBN: 978-3-642-33932-5
eBook Packages: EngineeringEngineering (R0)