Security requirements for management systems using mobile agents

被引:2
|
作者
Reiser, H [1 ]
Vogt, G [1 ]
机构
[1] Univ Munich, Munich Network Management Team, Munich, Germany
关键词
security; mobile agent systems; management by delegation;
D O I
10.1109/ISCC.2000.860633
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive role in terms of acceptance and applicability of mobile agents. In this paper we analyze the threats and attacks against mobile agent systems used for management purposes. Therefore, general models of mobile agent based management systems are developed. Based on a risk analysis of these models we derive security requirements. In order to satisfy these requirements components and services are identified and integrated in a comprehensive security architecture.
引用
收藏
页码:160 / 165
页数:6
相关论文
共 50 条
  • [41] Policy based migration of mobile agents in disaster management systems
    Sadik, Sarmad
    Pasha, Maruf
    Ali, Arshad
    Ahmad, H. Farooq
    Suguri, Hiroki
    SECOND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2006, PROCEEDINGS, 2006, : 224 - +
  • [42] Grid performance and resource management using mobile agents
    Di Martino, B
    Rana, OF
    PERFORMANCE ANALYSIS AND GRID COMPUTING, 2004, : 251 - 263
  • [43] A Review of Security Techniques for Mobile Agents
    Kaur, Mandeep
    Saxena, Sharad
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 807 - 812
  • [44] Trust enhanced security for mobile agents
    Lin, C
    Varadharajan, V
    Wang, Y
    Pruthi, V
    CEC 2005: Seventh IEEE International Conference on E-Commerce Technology, Proceedings, 2005, : 231 - 238
  • [45] Towards a Security Solution for Mobile Agents
    Menacer, Djamel Eddine
    Drias, Habiba
    Sibertin-Blanc, Christophe
    ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, 2013, 206 : 969 - 979
  • [46] Anonymity and security for autonomous mobile agents
    Raji, F.
    Ladani, B. Tork
    IET INFORMATION SECURITY, 2010, 4 (04) : 397 - 410
  • [47] Security Measures to Protect Mobile Agents
    Dadhich, Piyanka
    Govil, M. C.
    Dutta, Kamlesh
    INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10), 2010, 1324 : 298 - +
  • [48] Mobile agents and security: Protocols for integrity
    Corradi, A
    Cremonini, M
    Montanari, R
    Stefanelli, C
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS II, 1999, 15 : 177 - 190
  • [49] Domain based Security for Mobile Agents
    Malik, Najmus Saqib
    Kupzog, Friedrich
    Sonntag, Michael
    2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 543 - +
  • [50] Security Enhancements for Mobile Agents Platforms
    Aouadi, Hamed
    Ben Ahmed, Mohamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (7B): : 216 - 221