A dynamic policy based security architecture for mobile agents

被引:0
|
作者
Mubarak, Misbah [1 ]
Khan, Zarrar [1 ]
Sultana, Sara [1 ]
Asghar, Hajra Batool [1 ]
Ahmad, H. Farooq [2 ]
Suguri, Hiroki [2 ]
Jabeen, Fakhra [1 ]
机构
[1] NUST, Aoba Ku, 2-15-28 Omachi, Sendai, Miyagi, Japan
[2] Commun Technol, Aoba Ku, Sendai, Miyagi, Japan
关键词
mobile agents; encryption; digital signatures; ontologies; reconfigurable policies;
D O I
10.1007/978-1-4020-6270-4_41
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile agents are undoubtedly the upcoming trend in the agent community. As their use is increasing, security problems are coming forth. A mobile agent must address several security issues. An agent may be malicious, the platform on which it executes may carry on sinister activities on it or the agent may be harmed by another malicious agent. Most of the security approaches do not provide any flexibility or dynamic decision making. Therefore, security threats increase further. In our paper, we suggest an approach that uses dynamic ontology based policies to enforce security in platforms as well as in mobile agents. The approach is a hybrid one which utilizes other security measures as well. We have also evaluated the approach on software quality parameters other than security like portability, flexibility and efficiency. The results have been satisfactory.
引用
收藏
页码:493 / +
页数:2
相关论文
共 50 条
  • [31] A reliable mobile agents architecture
    Dalmeijer, M
    Rietjens, E
    Hammer, D
    Aerts, A
    Soede, M
    [J]. FIRST INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING (ISORC '98), 1998, : 64 - 72
  • [32] Zero Trust-Based Mobile Network Security Architecture
    Liu, Yiliang
    Su, Zhou
    Peng, Haixia
    Xiang, Yushan
    Wang, Wei
    Li, Ruidong
    [J]. IEEE WIRELESS COMMUNICATIONS, 2024, 31 (02) : 82 - 88
  • [33] A security architecture of VANET based on blockchain and mobile edge computing
    Zhang, XiaoDong
    Li, Ru
    Cui, Bo
    [J]. PROCEEDINGS OF 2018 1ST IEEE INTERNATIONAL CONFERENCE ON HOT INFORMATION-CENTRIC NETWORKING (HOTICN 2018), 2018, : 258 - 259
  • [34] Information security policy architecture
    Alam, Mehtab
    Bokhari, M. U.
    [J]. ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 120 - +
  • [35] Profile-based security against malicious mobile agents
    Li, Hua
    Greene, Glena
    Alonso, Rafael
    [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2006, 4093 : 1017 - 1024
  • [36] Implement of Dynamic Security Policy Based on an Open Synthetical Security Model
    Lei Xinfeng
    Liu Jun
    Xiao Junmo
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 341 - 344
  • [37] Distributed IDS architecture based on learning and analysis mobile agents
    Peng, XG
    Liu, YS
    Wu, YS
    Peng, XG
    Shi, RC
    [J]. ACTIVE MEDIA TECHNOLOGY, 2003, : 126 - 131
  • [38] Hybrid agents based architecture on automated dynamic environments
    Tapia, Dante I.
    Bajo, Javier
    Corchado, Juan M.
    Rodriguez, Sara
    Manzano, Juan M.
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT II, PROCEEDINGS, 2007, 4693 : 453 - 460
  • [39] Mobile agents based electronic trading architecture using XML
    Park, JH
    Yeom, KW
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: II, 2003, : 130 - 135
  • [40] A distributed dynamic μFirewall architecture with mobile agents and KeyNote trust management system
    Jin, H
    Xian, F
    Han, ZF
    Li, SL
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 13 - 24