The architecture and security of a mobile communication agent

被引:0
|
作者
Ge, Jinming [1 ]
机构
[1] Wilberforce Univ, Wilberforce, OH 45384 USA
关键词
architecture and security; mobile communication; agent; interface; trust; memory key;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents the architecture and analyzes the security of a mobile communication agent that is rich in communication interfaces, enabling a user to be connected to all his devices across different domains, such as a personal carry-on network, a home network and an office network. The agent can also be used as a gateway to interact with un-trusted network devices for services. The security of the agent itself depends on a cautious architectural design, a flash memory key used to save user's security configuration, and a password protected state transition. To protect the communications between the agent and other devices, encryption algorithms are selected based on trust-levels and performance needs.
引用
收藏
页码:125 / 129
页数:5
相关论文
共 50 条
  • [21] On security in mobile agent systems
    Arunkumar, S
    Nagender, S
    PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 631 - 642
  • [22] Mobile agent security and reliability
    Hohl, F
    NINTH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 1998, : 181 - 181
  • [23] Security in a mobile agent system
    van't Noordende, GJ
    Brazier, FMT
    Tanenbaum, AS
    2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 35 - 45
  • [24] Mobile agent security and Telescript
    Tardo, J
    Valente, L
    DIGEST OF PAPERS: COMPCON SPRING 96, FORTY-FIRST IEEE COMPUTER SOCIETY INTERNATIONAL CONFERENCE - INTELLECTUAL LEVERAGE, 1996, : 58 - 63
  • [25] Security in mobile agent systems
    Sameh, A
    Fakhry, D
    2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS, 2002, : 4 - 5
  • [26] A mobile agent security management
    You, EG
    Lee, KS
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 360 - 365
  • [27] The research of mobile agent security
    Li, XB
    Zhang, AJ
    Sun, JF
    Yin, ZL
    GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 187 - 190
  • [28] Solution to mobile agent security
    Wang, Huifang
    Guo, Zhong
    Huang, Yongzhong
    Guo, Jingeng
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [29] Countermeasures for mobile agent security
    Jansen, WA
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1667 - 1676
  • [30] Architecture for Mobile Business based on mobile agent
    Aloui, Ahmed
    Zerdoumi, Oussama
    Kazar, Okba
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 955 - 959