RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems

被引:0
作者
Aloulou, Houssem [1 ]
Loulou, Monia [1 ]
Kallel, Slim [1 ]
Kacem, Ahmed Hadj [1 ]
机构
[1] Lab ReDCAD, Sfax, Tunisia
来源
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY | 2010年 / 5939卷
关键词
Security policy; Mobile agent systems; Dynamic enforcement; Aspect-oriented Programming;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Defining security policies is a crucial stage for an efficient implementation of security within mobile agent systems. To enforce these policies in a reliable way, it is necessary to make use of formal techniques which offer enough flexibility and expressiveness, and which provide a rigorous reasoning about the security of mobile agent systems security. The migration of the agent between several systems can lead to inconsistencies between its policy and the policy of the system. These incoherencies may require a dynamic reconfiguration of the security policies of the system and the agent. This reconfiguration cannot be efficient without the use of mechanisms that improve the modularity of the security code. In this paper, we aim to dynamically enforce security policies in mobile agent systems in modular and reliable way. For this purpose, we combine formal methods and aspect oriented programming. We propose a three-step approach to enforce security policies in the form of aspects that will be generated through a reliable specification of security policies.
引用
收藏
页码:237 / 252
页数:16
相关论文
共 19 条
  • [11] LOULOU M, 2008, P 3 INT C RISKS SEC, P69
  • [12] Application Security Models for Mobile Agent Systems
    McDonald, J. Todd
    Yasinsac, Alec
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (03) : 43 - 59
  • [13] Meisels I., 1997, Z EVES REFERENCE MAN
  • [14] Flexible security policies for mobile agent systems
    Montanari, R
    Stefanelli, C
    Dulay, N
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2001, 25 (02) : 93 - 99
  • [15] Schneider H P, 2000, Climacteric, V3, P50, DOI 10.3109/13697130009167599
  • [16] TALHI C, 2007, THESIS LAVAL U CANAD
  • [17] Ugurlu S, 2006, LECT NOTES COMPUT SC, V3831, P538
  • [18] Viega J., 2001, Cutter IT Journal, V14, P31
  • [19] Woodcock J., 1996, USING Z SPECIFICATIO