Application of Mobile Agents for Security Using Multilevel Access Control
نویسندگان
چکیده
in distributed computing environment, Mobile agents are mobile autonomous processes which operate on behalf of users (e.g., the Internet). These applications include a specialized search of a middleware services such as an active mail system, large free-text database, electronic malls for shopping, and updated networking devices. Mobile agent systems use less network bandwidth, increase asynchrony among clients and servers, dynamically update server interfaces and introduce concurrency. Due to software components, security of mobile agent is essential in any mobile agent based application. Security services such as Confidentiality, Integrity, Authentication, Authorization and Non-Repudiation are discussed and combat with by the researchers. This work is proposing a new technique for access control area of security for the mobile agents and it will be implemented using an example of shopping cart data sharing for multiple levels. KeywordsMobile Agents, Access Control, Authentication, Attacks, Security, Use of Mobile Agents in Shopping Cart
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملارائه یک رویکرد همانند سازی شده عامل محور در اجرای یک الگوی کد متحرک مطمئن
Abstract Using mobile agents, it is possible to bring the code close to the resources, which is not foreseen by the traditional client/server paradigm. Compared to the client/server computing paradigm, the greater flexibility of the mobile agent paradigm comes at additional costs as well as the additional complexity of developing and managing mobile agent-based applications. Such complexity ...
متن کاملSecurity Issues in Mobile Agents
Software security to protect mobile agent consists of lots of aspects like cryptography, access control and trust management, intrusion detection and tamper resistance, authentication and privacy, signature schemes, e-commerce, security analysis, mobile computing security etc. So, to design and develop security mechanisms for mobile agents against malicious hosts this paper identifies different...
متن کاملSMASH: Modular Security for Mobile Agents TR-UTEDGE-2006-007
Mobile agent systems of the future will be used for secure information delivery and retrieval, off-line searching and purchasing, and even system software updates. As part of such applications, agent and platform integrity must be maintained, confidentiality between agents and the intended platform parties must be preserved, and accountability of agents and their platform counterparts must be s...
متن کامل