A Flexible Security Framework for Mobile Agent Systems

被引:0
|
作者
Patel, R. B.
Garg, K.
机构
关键词
Agent host; agent submitter; itinerary; trusted host; security;
D O I
10.2316/Journal.201.2005.3.201-1518
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile agent technology raises significant security concerns and requires a thorough security framework, with a wide range of strategies and mechanisms, for the protection of both agents and agent hosts, against possibly malicious reciprocal behaviour. Researchers have identified several security attacks. These are mainly from one host to another, from an agent to a host, from a host to an agent, and from one agent to another. Agent itineraries must also be made secure and robust in order to ensure secure agent behaviour. Unless the above issues are addressed properly, mobile agent technology cannot be used to implement real-world applications. The security infrastructure should have the ability to flexibly and dynamically offer different solutions, to achieve different qualities of security service, depending on application requirements. The authors report on mechanisms for providing security of agent itineraries, based on an identified security architecture. They present three protocols, which provide both security and robustness to agent itineraries, in a separate middleware layer that is flexible because it can be suitably modified as per requirements. The proposed techniques have been implemented and tested on the PMADE system; this work reports the results of a comparison of these techniques with some existing ones.
引用
收藏
页数:2
相关论文
共 50 条
  • [41] Security in a mobile agent system
    van't Noordende, GJ
    Brazier, FMT
    Tanenbaum, AS
    [J]. 2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 35 - 45
  • [42] Mobile agent security and Telescript
    Tardo, J
    Valente, L
    [J]. DIGEST OF PAPERS: COMPCON SPRING 96, FORTY-FIRST IEEE COMPUTER SOCIETY INTERNATIONAL CONFERENCE - INTELLECTUAL LEVERAGE, 1996, : 58 - 63
  • [43] A mobile agent security management
    You, EG
    Lee, KS
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 360 - 365
  • [44] Solution to mobile agent security
    Wang, Huifang
    Guo, Zhong
    Huang, Yongzhong
    Guo, Jingeng
    [J]. Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [45] The research of mobile agent security
    Li, XB
    Zhang, AJ
    Sun, JF
    Yin, ZL
    [J]. GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 187 - 190
  • [46] Countermeasures for mobile agent security
    Jansen, WA
    [J]. COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1667 - 1676
  • [47] Security issues related to mobile code and agent-based systems
    Oppliger, R
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (12) : 1165 - 1170
  • [48] Enforcing history-based security policies in mobile agent systems
    Dias, P
    Ribeiro, C
    Ferreira, P
    [J]. IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 231 - 234
  • [49] A security scheme for mobile agent platforms in large-scale systems
    Wangham, MS
    Fraga, JD
    Obelheiro, RR
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 104 - 116
  • [50] RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems
    Aloulou, Houssem
    Loulou, Monia
    Kallel, Slim
    Kacem, Ahmed Hadj
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2010, 5939 : 237 - 252