A SECURITY BASED MODEL FOR MOBILE AGENT SOFTWARE SYSTEMS

Author:

XU HAIPING1,ZHANG ZHIGUO2,SHATZ SOL M.2

Affiliation:

1. Computer and Information Science Department, University of Massachusetts Dartmouth, North Dartmouth, MA 02747-2300, USA

2. Department of Computer Science, University of Illinois at Chicago, 851 S. Morgan Street, Chicago, IL 60607-7053, USA

Abstract

Security modeling for agents has been one of the most challenging issues in developing practical mobile agent software systems. In the past, researchers have developed mobile agent systems with emphasis either on protecting mobile agents from malicious hosts or protecting hosts from malicious agents. In this paper, we propose a security based mobile agent system architecture that provides a general solution to protecting both mobile agents and agent hosts in terms of agent communication and agent migration. We present a facilitator agent model that serves as a middleware for secure agent communication and agent migration. The facilitator agent model, as well as the mobile agent model, is based on agent-oriented G-nets — a high level Petri net formalism. To illustrate our formal modeling technique for mobile agent systems, we provide an example of agent migration to show how a design error can be detected.

Publisher

World Scientific Pub Co Pte Lt

Subject

Artificial Intelligence,Computer Graphics and Computer-Aided Design,Computer Networks and Communications,Software

Reference27 articles.

1. K. Rothermel and M. Schwehm, Encyclopedia for Computer Science and Technology 40, eds. A. Kent and J. G. Williams (Marcel Dekker, New York, 1999) pp. 155–176.

2. Mobile UNITY

3. C. Mascolo, Third Int. Conf. on Coordination Models and Languages, LNCS 1594, eds. P. Ciancarini and A. Wolf (Springer-Verlag, 1999) pp. 37–52.

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Euler totient function and fermat Euler theorem based an optimized key management scheme for securing mobile agents migration;International Journal of Information Technology;2022-01-24

2. SECURITY REQUIREMENT REPRESENTATION METHOD FOR CONFIDENCE OF SYSTEMS AND NETWORKS;International Journal of Software Engineering and Knowledge Engineering;2010-02

3. A review of security implications and possible solutions for mobile agents in e-commerce;2009 Innovative Technologies in Intelligent Systems and Industrial Applications;2009-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3