{"title":"Implementing mobile agent security in an untrusted computing environment","authors":"A. Wagner","doi":"10.1109/CONTEL.2005.185960","DOIUrl":null,"url":null,"abstract":"Many researchers have agreed on the validity of the observation that the use of mobile agent systems will not attain a critical mass unless the problem of security is solved. As mobile agents are most likely to be used in an untrusted environment (such as the Internet) the various components of the agent system are to be protected against security threats. If security is not guaranteed, sensitive user data may be leaked or forged. This paper offers an overview of possible approaches to counter the most notorious of agent system security threats, the one presented by malicious agent hosts. The requirements for protection against such attacks are outlined, and new methods of protection are also introduced. I. INTRODUCTION By most researchers, mobile agent systems are considered to be a viable alternative to client-server systems in certain applications. Some of the often recited advantages of mobile agents over client-server architectures are:","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONTEL.2005.185960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Many researchers have agreed on the validity of the observation that the use of mobile agent systems will not attain a critical mass unless the problem of security is solved. As mobile agents are most likely to be used in an untrusted environment (such as the Internet) the various components of the agent system are to be protected against security threats. If security is not guaranteed, sensitive user data may be leaked or forged. This paper offers an overview of possible approaches to counter the most notorious of agent system security threats, the one presented by malicious agent hosts. The requirements for protection against such attacks are outlined, and new methods of protection are also introduced. I. INTRODUCTION By most researchers, mobile agent systems are considered to be a viable alternative to client-server systems in certain applications. Some of the often recited advantages of mobile agents over client-server architectures are: