A secure mobile agents platform

被引:9
作者
Ismail, Leila [1 ]
机构
[1] College of IT, United Arab Emirates University, Al-Ain
来源
Journal of Communications | 2008年 / 3卷 / 02期
关键词
Access control; Authentication; Mobile agents; Security;
D O I
10.4304/jcm.3.2.1-12
中图分类号
学科分类号
摘要
Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In this paper, we propose protection mechanisms for mobile agents. In these mechanisms, the authentication of mobile agents and the access control to the system resources are controlled by the mobile-agents platform. Each agent defines its own access control policy with regard to other agents using an Interface Definition Language (IDL), thus enforcing modularity and easing programming task. An evaluation of these mechanisms has been conducted. The measurements give the overhead involved by the proposed protection mechanisms to the performance of mobile agents. An important advantage of our protection mechanisms are transparency to agents and the portability of nonsecure applications onto a secure environment. A mobile agent system and the protection mechanisms have been implemented. Our experiments have shown the feasibility and the advantages of our mechanisms. © 2008 Academy Publisher.
引用
收藏
页码:1 / 21
页数:20
相关论文
共 32 条
  • [1] Chess D., Harrison C., Kershenbaum A., Mobile Agents: Are They a Good Idea?: IBM Research Division, T. J
  • [2] Mobile Agent Facility Specification, OMG TC Document cf/96-08-01, (1996)
  • [3] Mobile Agent Facility Specification
  • [4] Ismail L., Hagimont D., A Performance Evaluation of the Mobile Agents Paradigm, In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications OOPSLA'99. ISBN = 1-58113-238-7, 0-201-48561-3 (Addison Wesley Longman), pp. 306-313
  • [5] Gosling J., McGilton H., The Java Language Environment: A White Paper, (1996)
  • [6] Oaks S., Java Security
  • [7] Jensen C., Ismail L., Capability Based Protection for Hosting Mobile Code, ERSADS'97, (1997)
  • [8] Hagimont D., Ismail L., A Protection Scheme for Mobile Agents on Java, 3rd ACM/IEEE International Conference on Mobile Computing and Networking, pp. 215-222, (1997)
  • [9] Roth V., Jalali-Sohi M., Access Control and Key Management for Mobile Agents, (2001)
  • [10] Koray Sahingoz O., Erdogan N., A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering, Lecture Notes in Computer Science, 3036, (2004)