Security requirements for management systems using mobile agents

被引:2
|
作者
Reiser, H [1 ]
Vogt, G [1 ]
机构
[1] Univ Munich, Munich Network Management Team, Munich, Germany
关键词
security; mobile agent systems; management by delegation;
D O I
10.1109/ISCC.2000.860633
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive role in terms of acceptance and applicability of mobile agents. In this paper we analyze the threats and attacks against mobile agent systems used for management purposes. Therefore, general models of mobile agent based management systems are developed. Based on a risk analysis of these models we derive security requirements. In order to satisfy these requirements components and services are identified and integrated in a comprehensive security architecture.
引用
收藏
页码:160 / 165
页数:6
相关论文
共 50 条
  • [31] Case Studies in Security and Resource Management for Mobile Object Systems
    Dejan Milojicic
    Gul Agha
    Philippe Bernadat
    Deepika Chauhan
    Shai Guday
    Nadeem Jamali
    Dan Lambright
    Franco Travostino
    Autonomous Agents and Multi-Agent Systems, 2002, 5 : 45 - 79
  • [32] Case studies in security and resource management for mobile object systems
    Milojicic, D
    Agha, G
    Bernadat, P
    Chauhan, D
    Guday, S
    Jamali, N
    Lambright, D
    Travostino, F
    AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2002, 5 (01) : 45 - 79
  • [33] Information Security Management Scaffold for Mobile Money Systems in Uganda
    Kanobe, Fredrick
    Alexander, Margaret Patricia
    Bwalya, Kelvin Joseph
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 239 - 247
  • [34] Security Requirements for SATCOM Datalink Systems for Future Air Traffic Management
    Bernsmed, Karin
    Froystad, Christian
    Meland, Per Hakon
    Myrvoll, Tor Andre
    2017 IEEE/AIAA 36TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2017,
  • [35] Security in mobile systems
    Subramanyam, V
    Joshi, A
    SEVENTEENTH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 407 - 412
  • [36] Using mobile agents to support interorganizational workflow management
    Hamburg Univ, Hamburg, Germany
    Appl Artif Intell, 6 (551-572):
  • [37] ATM network connection management using mobile agents
    Lazar, S
    Kodeswaran, S
    Varadharaj, R
    Sidhu, D
    25TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS - PROCEEDINGS, 2000, : 620 - 621
  • [38] Using mobile agents for distributed Network Performance Management
    Gavalas, D
    Greenwood, D
    Ghanbari, M
    O'Mahony, M
    INTELLIGENT AGENTS FOR TELECOMMUNICATION APPLICATIONS, 1999, 1699 : 96 - 112
  • [39] Connection management in MPLS networks using mobile agents
    Yucel, S
    Saydam, T
    NETWORKING - ICN 2001, PART II, PROCEEDINGS, 2001, 2094 : 329 - 338
  • [40] Policy based migration of mobile agents in disaster management systems
    Sadik, Sarmad
    Pasha, Maruf
    Ali, Arshad
    Ahmad, H. Farooq
    Suguri, Hiroki
    SECOND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2006, PROCEEDINGS, 2006, : 224 - +