This chapter presents a high-security access-control system. The system consists of a set of intelligent agents that are organized in several layers and store the global knowledge in a global ontology. They learn user behavior at the access points and recognize significant behavior deviations produced by intruders or due to other unwanted situations. This chapter also presents three prototypes of the system, each specialized for a subset of security problems. The experiments show that the system is efficient in recognizing stolen-identification entries.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 email@example.com
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 firstname.lastname@example.org