Security requirements for management systems using mobile agents

被引:2
|
作者
Reiser, H [1 ]
Vogt, G [1 ]
机构
[1] Univ Munich, Munich Network Management Team, Munich, Germany
关键词
security; mobile agent systems; management by delegation;
D O I
10.1109/ISCC.2000.860633
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive role in terms of acceptance and applicability of mobile agents. In this paper we analyze the threats and attacks against mobile agent systems used for management purposes. Therefore, general models of mobile agent based management systems are developed. Based on a risk analysis of these models we derive security requirements. In order to satisfy these requirements components and services are identified and integrated in a comprehensive security architecture.
引用
收藏
页码:160 / 165
页数:6
相关论文
共 50 条
  • [1] Security requirements for management systems using mobile agents
    Reiser, H.
    Vogt, G.
    IEEE Symposium on Computers and Communications - Proceedings, 2000, : 160 - 165
  • [2] Security requirements for mobile agents in electronic markets
    Zapf, M
    Müller, H
    Geihs, K
    TRENDS IN DISTRIBUTED SYSTEMS FOR ELECTRONIC COMMERCE, 1998, 1402 : 205 - 217
  • [3] Security Requirements of a Mobile Device Management System
    Rhee, Keunwoo
    Jeon, Woongryul
    Won, Dongho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 353 - 358
  • [4] Using the intelligence of mobile agents in road management systems
    Sasak, J
    ConTEL 2005: Proceedings of the 8th International Conference on Telecommunications, Vols 1 and 2, 2005, : 595 - 601
  • [5] Integrated network management systems using mobile agents:: A prototype
    Cui, DM
    Gutiérrez, JA
    ISSUES AND TRENDS OF INFORMATION TECHNOLOGY MANAGEMENT IN CONTEMPORARY ORGANIZATIONS, VOLS 1 AND 2, 2002, : 257 - 260
  • [6] Security Management for Mobile Learning Systems
    Zamfiroiu, Alin
    ELEARNING CHALLENGES AND NEW HORIZONS, VOL 1, 2018, : 42 - 48
  • [7] Study of the Security in Network Management Based on Mobile Agents
    CHEN Zhi~1 WANG Ru-chuan~(1
    2.State Key Laboratory for Novel Software Technology
    The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 37 - 42
  • [8] A Conceptual Approach to Place Security in Systems of Mobile Agents
    Hachicha, Hela
    Samet, Donies
    Ghedira, Khaled
    MULTIAGENT SYSTEM TECHNOLOGIES, MATES 2015, 2015, 9433 : 154 - 170
  • [9] Mobile agents and security
    Greenberg, MS
    Byington, JC
    Harper, DG
    IEEE COMMUNICATIONS MAGAZINE, 1998, 36 (07) : 76 - 85
  • [10] Security requirements model for grid data management systems
    Naqvi, Syed
    Massonet, Philippe
    Arenas, Alvaro
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 30 - 41