Security Loop Agents for the Enterprise Applications based on Resource Description Framework

Ahmed Isam Khaleel (1), Ibraheem T. Nather (2), Adib M. Monzer Habbal (3)
(1) InterNetWorks Research Group, College of Arts and Sciences, University Utara Malaysia
(2) InterNetWorks Research Group, College of Arts and Sciences, University Utara Malaysia
(3) InterNetWorks Research Group, College of Arts and Sciences, University Utara Malaysia
Fulltext View | Download
How to cite (IJASEIT) :
Khaleel, Ahmed Isam, et al. “Security Loop Agents for the Enterprise Applications Based on Resource Description Framework”. International Journal on Advanced Science, Engineering and Information Technology, vol. 1, no. 4, Aug. 2011, pp. 409-12, doi:10.18517/ijaseit.1.4.83.
Security loop-holes can cost a fortune to a large enterprise organization providing e-commerce services. Meanwhile, the enterprise applications have been applied widely to simplify and generate better performance in managing the business tasks. Most of these applications (Enterprise Applications) unable to provide a high level of security due to the new daily threats specially when malicious agents entered into agent platforms and destroyed other active agents during the agent performance for client query. Meanwhile, the security issues in these applications left in the system unintentionally but are intruded intentionally. Hence, this study aims to come out with suitable solution for the existing question on how to secure and platform independent environment for the enterprise applications? By designing architecture to provides a secure and platform independent environment for agents' communication.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).