Security requirements for management systems using mobile agents

被引:2
|
作者
Reiser, H [1 ]
Vogt, G [1 ]
机构
[1] Univ Munich, Munich Network Management Team, Munich, Germany
关键词
security; mobile agent systems; management by delegation;
D O I
10.1109/ISCC.2000.860633
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive role in terms of acceptance and applicability of mobile agents. In this paper we analyze the threats and attacks against mobile agent systems used for management purposes. Therefore, general models of mobile agent based management systems are developed. Based on a risk analysis of these models we derive security requirements. In order to satisfy these requirements components and services are identified and integrated in a comprehensive security architecture.
引用
收藏
页码:160 / 165
页数:6
相关论文
共 50 条
  • [21] Connection management using adaptive mobile agents
    White, T
    Pagurek, B
    Oppacher, F
    INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-IV, PROCEEDINGS, 1998, : 802 - 809
  • [22] Mobile software agents for decentralised network and systems management
    Gavalas, D
    Greenwood, D
    Ghanbari, M
    O'Mahony, M
    MICROPROCESSORS AND MICROSYSTEMS, 2001, 25 (02) : 101 - 109
  • [23] Mobile agents for Web-based systems management
    Bellavista, P
    Corradi, A
    Tarantino, F
    Stefanelli, C
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 1999, 9 (05): : 360 - 371
  • [24] Guarding Security Sensitive Content using Confined Mobile Agents
    van 't Noordende, Guido
    Brazier, Frances M. T.
    Tanenbaum, Andrew S.
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 48 - 55
  • [25] ABADAM: A security model to databases access using mobile agents
    Franco Borre, David Antonio
    Moya Villa, Yasmin
    Quintana Alvarez, Moises Roman
    Garcia Bolanos, Miguel Angel
    Rodriguez Ribon, Julio Cesar
    INGENIERIA, 2008, 13 (01): : 58 - 66
  • [26] Security Measures in Complex Multiagent Systems Composed from Mobile Agents
    Iantovics, Barna
    Crainicu, Bogdan
    COMPLEXITY IN ARTIFICIAL AND NATURAL SYSTEMS, PROCEEDINGS, 2008, : 47 - 55
  • [27] Checkpointing using mobile agents in distributed systems
    Mandal, Partha Sarathi
    Mukhopadhyaya, Krishnendu
    ICCTA 2007: INTERNATIONAL CONFERENCE ON COMPUTING: THEORY AND APPLICATIONS, PROCEEDINGS, 2007, : 39 - +
  • [28] Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network
    Patel, Jaykumar Shantilal
    Chavda, Vijaykumar M.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 23 - 28
  • [30] SECURITY REQUIREMENTS FOR NETWORK MANAGEMENT
    SHIREY, RW
    COMPUTER STANDARDS & INTERFACES, 1995, 17 (04) : 321 - 331