{"title":"Design and development of a practical security model for a mobile agent system","authors":"A. Puliafito, O. Tomarchio","doi":"10.1109/ISCC.2002.1021718","DOIUrl":null,"url":null,"abstract":"Since its appearance, mobile agent technology has been considered as a new and flexible paradigm for distributed application development. However because of code mobility, this paradigm produces new threats to security too, which are of central importance when proposing this technology for commercial applications. We show the security services which have been specifically designed and developed for the MAP agent system. Early performance measurements show how the overhead needed by the security mechanisms introduced can be acceptable if compared with the functionalities provided.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC.2002.1021718","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
Since its appearance, mobile agent technology has been considered as a new and flexible paradigm for distributed application development. However because of code mobility, this paradigm produces new threats to security too, which are of central importance when proposing this technology for commercial applications. We show the security services which have been specifically designed and developed for the MAP agent system. Early performance measurements show how the overhead needed by the security mechanisms introduced can be acceptable if compared with the functionalities provided.