Application Security Models for Mobile Agent Systems
نویسندگان
چکیده
Mobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms. We develop application security models that capture initial trust relationships and consider their use for mobile agent security.
منابع مشابه
Trust in Mobile Agent Systems
The protection of mobile agent systems continues to be an active area of research that will enable future applications to utilize this paradigm of computing. Agent systems and mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We pose models for viewing security in application contexts that aid the mobile ...
متن کاملCooperative Control of Mobile Robots in Creating a Runway Platform for Quadrotor Landing
Multi-agent systems are systems in which several agents accomplish a mission in a cooperative manner. In this paper, a novel idea for the construction of a movable runway platform based on multi-agent systems is presented. It is assumed that an aerial agent (quadrotor) decides to make an emergency landing due to reasons such as a decrease in energy level or technical failure, while there is no ...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملSecurity Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive role in terms of acceptance and applicability of mobile agents. In this paper we analyze the threats and attacks against mobile agent systems used for management purposes. Therefore, general models of mobile agent bas...
متن کاملA platform independent approach for Mobile Agents to monitor Network Vulnerabilities
Mobile Agents are an effective choice for many research and application areas due to several reasons, including improvements in latency and bandwidth of client-server applications, reducing network load and threat assessment. Intrusion Detection Systems and Vulnerability assessment systems are used to monitor network traffic, to measure and prioritize the risks associated with network and host ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electr. Notes Theor. Comput. Sci.
دوره 157 شماره
صفحات -
تاریخ انتشار 2006