Mobile Agent Protection Mechanisms, and the Trusted Agent Proxy Server (TAPS) Architecture

نویسنده

  • Michelangelo Giansiracusa
چکیده

Autonomous mobile agents have been purported as a promising new alternative to traditional distributed computing approaches, bringing many advantageous features. Notwithstanding this, mobile agent technology has yet to see wide deployment in open networks like the Internet. The lack of interoperability between agent systems has impaired such progress. Moreover, fears of security breaches by malicious agent platforms has been a chief contributing factor in the lack of capital investment in Internet agent technology. The attraction of the mobile agent paradigm is diminished if the agent owner cannot trust the results of its deployed agents. However, as in other distributed systems, appropriately applying traditional distributed systems security techniques and incorporating trusted third-parties can discourage and detect bad behaviour by remote systems. This paper presents the TAPS architecture for mitigating security risks from malicious agent platforms. The TAPS architecture uniquely adapts highly standardised network security techniques (appropriately in an agent framework) so that previously untrusted agent platforms are held more accountable. With a key objective being compliance to the Mobile Agent Facility specification, a large number of agent systems can readily utilise the features of this security architecture. The TAPS architecture provides a ’middleman’ server that anonomises authenticated agent entities in agent itineraries. We believe that the TAPS architecture will be a substantially more robust approach for protecting mobile agents than existing mobile agent threat countermeasures which tend to be piecemeal and inflexible in nature.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Secure Trusted Agent Proxy Server Architecture

Concerns of malicious platform hosting of mobile agents has been a significant factor in the absence of investment in agent technologies for e-commerce in the greater Internet. However, as in other distributed systems, appropriately applying traditional distributed systems security techniques and incorporating trusted third-parties can discourage bad behaviour by remote systems. The concept and...

متن کامل

Mobile Agent security using Proxy-agents and Trusted domains∗

Commercial or wide-network deployment of Mobile Agent Systems is not possible without satisfying security architecture. In this paper we propose architecture for secure Mobile Agent Systems, using Trusted Domains and Proxy agents. Existing approaches are based on security services at the level of an agent system, library or specific objects. Our concept uses proxy agents to enable transparent s...

متن کامل

Ajanta | A System for Mobile Agent Programming

This paper gives an overview of Ajanta, a Java-based system for mobile agent programming. We discuss the Ajanta architecture, and elaborate on the mechanisms used to provide object mobility, and secure execution of mobile agents in connned protection domains. The agent programming environment is deened, in terms of a set of primitive operations. A proxy-based ne-grained access control mechanism...

متن کامل

A Mobile Agent based Computing Model for Enhancing Privacy in Multi-party Collaborative Problem solving

Privacy is an important issue in multi-party collaborative problems that are conventionally dealt with distributed algorithms. To get the solution, the participants need to share their private information, resulting in privacy loss. Several multiagent algorithms try to reduce privacy loss by reducing the amount of shared private information among the agents. To address the privacy issue in mult...

متن کامل

Protecting Integrity and Secrecy of Mobile Agents on Trusted and Non-Trusted Agent Places

Mobile Software Agents are at the mercy of the agent places they visit on their itinerary. But certain applications have a need for protection of secrecy and integrity of parts of the mobile agents data space. In this paper I will introduce a definition of the term Mobile Software Agent that is derived from a general definition of the term agent and the definition of Wooldridge and Jennings in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003