Skip to main content

Distributed Authorization Framework for Mobile Agents

  • Conference paper
Mobility Aware Technologies and Applications (MATA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3744))

Abstract

Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems a feasible solution. Even so, mobile agents present some security related problems. An important one is resource access control. The ability for mobile agents to provide a simple, scalable, flexible, and secure access control system is a key point for the widespread adoption of mobile agents. In this paper we propose a mechanism to safely assign roles to mobile agents and an access control method based on Role-based Access Control (RBAC). The access control method provides a simple, lightweight and distributed model for mobile agent applications. It is proposed as an extension of the MARISM-A (An Architecture for Mobile Agents with Recursive Itineraries and Secure Migration) project, a secure mobile agent platform.

This work has been partially funded by the Spanish Ministry of Science and Technology (MCYT) though the project TIC2003-02041.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chess, D.: Security issues of mobile agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477. Springer, Heidelberg (1998)

    Google Scholar 

  2. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: RFC 2693: SPKI certificate theory. IETF (1999)

    Google Scholar 

  3. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust Management System. RFC 2704, IETF (1999)

    Google Scholar 

  4. Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 4 (2001)

    Google Scholar 

  5. Tripathi, A., Karnik, N.: Protected resource access for mobile agent-based distributed computing. In: Proceedings of the ICPP workshop on Wireless Networking and Mobile Computing (1998)

    Google Scholar 

  6. Hu, Y.J.: Some thoughts on agent trust and delegation. In: Proceedings of the fifth International Conference on Autonomous Agents (2001)

    Google Scholar 

  7. Aura, T.: Distributed access-rights management with delegation certificates. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  8. JADE Board: Jade security guide. JADE-S Version 2 add-on (2005)

    Google Scholar 

  9. Suri, N., Bradshaw, J., Breedya, M., Groth, P., Hill, G., Jeffers, R., Mitrovich, T.: An overview of the nomads mobile agent system. In: Proceedings of 14th European Conference on Object-Oriented Programming (2000)

    Google Scholar 

  10. Bradshaw, J.M.: KAoS: Toward an industrial-strength open agent architecture. In: Nwana, H.S., Azarmi, N. (eds.) Software Agents and Soft Computing: Towards Enhancing Machine Intelligence. LNCS, vol. 1198, Springer, Heidelberg (1997)

    Google Scholar 

  11. Robles, S., Mir, J., Ametller, J., Borrell, J.: Implementation of Secure Architectures for Mobile Agents in MARISM-A. In: Karmouch, A., Magedanz, T., Delgado, J. (eds.) MATA 2002. LNCS, vol. 2521, pp. 182–191. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Cartrysse, K., van der Lubbe, J.: Privacy in mobile agents. In: First IEEE Symposium on Multi-Agent Security and Survivability (2004)

    Google Scholar 

  13. Li, N., Winsborough, W., Mitchell, J.: Distributed credential chain discovery in trust management. In: ACM Conference on Computer and Communications Security (2001)

    Google Scholar 

  14. FIPA TC Ad Hoc: Fipa agent discovery service specification (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Navarro, G., Ortega-Ruiz, J.A., Ametller, J., Robles, S. (2005). Distributed Authorization Framework for Mobile Agents. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I. (eds) Mobility Aware Technologies and Applications. MATA 2005. Lecture Notes in Computer Science, vol 3744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11569510_13

Download citation

  • DOI: https://doi.org/10.1007/11569510_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29410-8

  • Online ISBN: 978-3-540-32031-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics