There is a growing need for the evaluation and certification of distributed systems regarding security standards. Almost all existing multi-agent systems that have been developed in the context of the telecommunications market neglect strong security evaluations. In particular, an evaluation of a multi-agent system based on the widely accepted and well… (More)
This paper describes the agent framework JIAC IV, and the various projects it has been applied in. The projects were industry-funded as well as research-oriented. Our aim is to convey the particular requirements that followed from this link, and the consequences for the further development of the framework. We describe the projects and the impact that JIAC… (More)
durch Erfahrungen, Empfindungen und Informationen, im Bewusstsein vonMenschen.
—While mobile devices are becoming more and more powerful, the number of potential security threats is increasing. Although the important role of users in the realization of IT security measures is widely acknowledged and documented, research in the area of mobile security mostly concentrates on technical means. In this work we take the first step in… (More)
Humans can have manyd ifferentm otives, e.g. pleasure and challenge, to play games. Rapidly evolvingt echnologies in mobile devices have opened a new categoryofmobile gaming, e.g. by directlyintegrating motionsensorsinto the mobile devices.W eh avee xaminedafewn ew technologies andw hatk indo f motivation can be created by them. 1Introduction… (More)
In this paper we present an approach for an agent-based early warning system (A-EWS) for critical infrastructures. In our approach we combine existing security infrastructures, e.g. firewalls or intrusion detection systems, with new detection approaches to create a global view and to determine the current threat state.