Abstract
It is obvious that a prerequisite for use of mobile agent systems in many settings is that security is taken care of. A proper trust model is necessary in order to build security. Many security issues arise if the trust model implies that not all hosts are trusted. This paper discusses trust models, examines the security issues, and points at possible directions for solutions in terms of security services, mechanisms, and protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A Calculus for Access Control in Distributed Systems, ACM Transactions on Programming Languages and Systems, 15(4) (1993)
ACTS Agent Cluster: http://www.fokus.gmd.de/research/cc/ima/climate/entry.html
Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant Agents for Mobile Computing, IBM Research Report RC 20010 (03/27/95) (1995)
Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Issues and Requirements, Proceedings of the National Information Systems Security Conference (1996)
Fritzinger, J.S., Mueller, M.: Java Security Whitepaper, Sun Microsystems Inc. (1996)
Gray, R.: AgentTCL: A Flexible and Secure Mobile Agent System, Proceedings of 4th Annual USENIX TcL/Tk Workshop (1996)
IBM Research: Things that Go Bump in the Net, IBM Research Division, T.J. Watson Research Center (1995)
ITU-T X.810-816 ISO/IEC 10181/1-7: OSI-Security Frameworks for Open Systems (1996)
Johansen, D., van Renesse, R., Schneider, F.B.: An Introduction to the TACOMA Distributed System, Version 1.0, Technical Report 95-23, Department of Computer Science, University of Tromsø (1995)
Kaliski, B.: PKCS#7: Cryptographic Message Syntax Version 1.5, RFC2315 (1998)
Karjoth, G., Lange, D.B., Oshima, M.: A Security Model for Aglets, IEEE Internet Communication (1997)
Kristoffersen, T.: A Security Architecture for Open Distributed Processing, Dr.Scient. thesis 14, University of Oslo (1998)
McMahon, P.V.: SESAME V2 Public Key and Authorization Extensions to Kerberos, Proceedings of the ISOC Symposium on Network and Distributed Systems Security (1995)
OMG Joint Submission by Crystaliz Inc, General Magic Inc, GMD FOKUS, IBM, TOG: Mobile Agent System Interoperability Facility (1997)
Pretty Good Privacy (PGP) international homepage: http://www.ifi.uio.no/pgp
Schelderup, K.: Security of Mobile Agents (in Norwegian), NR Report 921, Norwegian Computing Centre (NR) (1997)
Schneider, F.B.: Towards Fault-tolerant and Secure Agentry, Proceedings of the 11th International Workshop on Distributed Algorithms (1997)
Secure Sockets Layer (SSL): http://www.netscape.com
Steiner, J.G., Neumann, C., Schiller, J.I.: Kerberos: An Authentication System for Open Network Systems, Proceedings of the 1988 Winter USENIX Conference (1988)
Tardo, J., Valente, L.: Mobile Agent Security and Telescript, Proceedings of the IEEE Compcon’ 96 Conference (1996)
Yee, B.S.; A Sanctuary for Mobile Agents, DARPA Workshop on Foundations for Secure Mobile Code (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schelderup, K., Ølnes, J. (1999). Mobile Agent Security — Issues and Directions. In: Zuidweg, H., Campolargo, M., Delgado, J. (eds) Intelligence in Services and Networks Paving the Way for an Open Service Market. IS&N 1999. Lecture Notes in Computer Science, vol 1597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48888-X_16
Download citation
DOI: https://doi.org/10.1007/3-540-48888-X_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65895-5
Online ISBN: 978-3-540-48888-0
eBook Packages: Springer Book Archive