Martín, PabloOrfila, AgustínCarbó Rubiera, Javier Ignacio2010-10-282010-10-282009-037th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009). Advances in Soft Computing. Springer, 2009, pp. 266-273978-3-642-00486-5 (impreso)978-3-642-00487-2 (online)1867-5662https://hdl.handle.net/10016/9542Proceeding of: 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009 (PAAMS 2009, 25-27 March 2009, Salamanca, SpainNowadays many intranets are deployed without enforcing any network security policy and just relying on security technologies such as firewalls or antivirus. In addition, the number and type of network entities are no longer fixed. Typically, laptops, PDAs or mobile phones need to have access to network resources occasionally. Therefore, it is important to design flexible systems that allow an easy administration of connectivity without compromising security. This article shows how software agents may provide secure configurations to a computer network in a distributed, autonomous and dynamic manner. Thus, here we describe the system architecture of a prototype, the negotiation protocol it uses and how it works in a sample scenario.application/octet-streamapplication/octet-streamapplication/pdfeng© Springer-VerlagMultiagentSecurity policyAgentNegotiation of network security policy by means of agentsconference paperInformática10.1007/978-3-642-00487-2_28open access2662737th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009)55