{"title":"基于组件的安全移动代理软件体系结构的两种适应策略","authors":"Hassan Razouki, Abdellatif Hair","doi":"10.1109/SITA.2013.6560821","DOIUrl":null,"url":null,"abstract":"Security presents a crucial point in mobile agent systems and may hinder the expansion and use of this paradigm. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechauisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms. The first is a static adaptation performed by the MSAS (the Management System of Agents Security). The second is a reflexive structural dynamic adaptation performed by the mobile agent itself. These two adaptations take into account the dynamic security requirements in systems based on mobile agent.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Components-based software architecture for secure mobile agents via two strategies of adaptation\",\"authors\":\"Hassan Razouki, Abdellatif Hair\",\"doi\":\"10.1109/SITA.2013.6560821\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security presents a crucial point in mobile agent systems and may hinder the expansion and use of this paradigm. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechauisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms. The first is a static adaptation performed by the MSAS (the Management System of Agents Security). The second is a reflexive structural dynamic adaptation performed by the mobile agent itself. These two adaptations take into account the dynamic security requirements in systems based on mobile agent.\",\"PeriodicalId\":145244,\"journal\":{\"name\":\"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-05-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SITA.2013.6560821\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SITA.2013.6560821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Components-based software architecture for secure mobile agents via two strategies of adaptation
Security presents a crucial point in mobile agent systems and may hinder the expansion and use of this paradigm. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechauisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms. The first is a static adaptation performed by the MSAS (the Management System of Agents Security). The second is a reflexive structural dynamic adaptation performed by the mobile agent itself. These two adaptations take into account the dynamic security requirements in systems based on mobile agent.