The architecture and security of a mobile communication agent

被引:0
|
作者
Ge, Jinming [1 ]
机构
[1] Wilberforce Univ, Wilberforce, OH 45384 USA
关键词
architecture and security; mobile communication; agent; interface; trust; memory key;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents the architecture and analyzes the security of a mobile communication agent that is rich in communication interfaces, enabling a user to be connected to all his devices across different domains, such as a personal carry-on network, a home network and an office network. The agent can also be used as a gateway to interact with un-trusted network devices for services. The security of the agent itself depends on a cautious architectural design, a flash memory key used to save user's security configuration, and a password protected state transition. To protect the communications between the agent and other devices, encryption algorithms are selected based on trust-levels and performance needs.
引用
收藏
页码:125 / 129
页数:5
相关论文
共 50 条
  • [41] Evaluating the security of mobile agent platforms
    Buerkle, Axel
    Hertel, Alice
    Mueller, Wilmuth
    Wieser, Martin
    AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2009, 18 (02) : 295 - 311
  • [42] Mobile agent security - Issues and directions
    Schelderup, K
    Olnes, J
    INTELLIGENCE IN SERVICES AND NETWORKS: PAVING THE WAY FOR AN OPEN SERVICE MARKET, 1999, 1597 : 155 - 167
  • [43] The Research on Mobile-agent Security
    WANG Ru chuan
    The Journal of China Universities of Posts and Telecommunications, 2002, (03) : 47 - 52
  • [44] Security design of mobile agent system
    Wang, JH
    Hu, JP
    Hu, K
    11TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, PROCEEDINGS, 2000, : 426 - 430
  • [45] Evaluating the security of mobile agent platforms
    Axel Bürkle
    Alice Hertel
    Wilmuth Müller
    Martin Wieser
    Autonomous Agents and Multi-Agent Systems, 2009, 18 : 295 - 311
  • [46] A Security Strategy of Mobile Agent System
    Li, Ying
    Hu, BaoFang
    Wei, ChengLin
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2401 - +
  • [47] Security in the Ajanta mobile agent system
    Karnik, NM
    Tripathi, AR
    SOFTWARE-PRACTICE & EXPERIENCE, 2001, 31 (04): : 301 - 329
  • [48] The Study and Perspective of Mobile Agent Security
    MU Honga~1 WANG Ru-chuan~(1
    2.State Key Laboratory of Information Security(Graduate School of Chinese Aeademy of Sciences)
    The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 48 - 53
  • [49] A security framework for a mobile agent system
    Bryce, C
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 273 - 290
  • [50] Method of security authentication for mobile agent
    Ding, J.G.
    Liu, H.L.
    Chen, H.S.
    Bai, Y.C.
    Jisuanji Gongcheng/Computer Engineering, 2001, 27 (02):