Home

Security

Security

Security

Businesses know that secure data and protected identities are the core foundations for everlasting, beneficial relationships with customers, business partners and employees. Businesses in pursuit of security must have systems that are flexible and adaptable to enable rapid response to changing market conditions, with the intelligence to learn from previous attacks.  The need to identity and access management solutions that are used by thousands of organizations and millions of end users world-wide every day.  A framework for security event management based on mobile agent technology. In the framework, various agents are designed for different functions and roles, and these agents can communicate and collaborate securely. By virtue of the autonomy, mobility, inferential capability and social ability of the mobile agent, the numerous security events which may appear at many locations in the network can be efficiently detected, verified by the sensor agent and the verification agent. Furthermore, the correlation agent can correlate the purified security events globally based on the temporal relation, the causal relation, the spatial relation and statistics relations among them.

Header Image

Contact Us