Advertisement

Trust Relationships in a Mobile Agent System

  • Hock Kim Tan
  • Luc Moreau
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2240)

Abstract

The notion of trust is presented as an important component in a security infrastructure for mobile agents. A trust model that can be used in tackling the aspect of protecting mobile agents from hostile platforms is proposed. We define several trust relationships in our model, and present a trust derivation algorithm that can be used to infer new relationships from existing ones. An example of how such a model can be utilized in a practical system is provided.

Keywords

Trust Model Mobile Agent Trust Relationship Execution Trace Direct Trust 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    C. Adams and S. Lyold. Understanding Public Key Infrastructure: Concepts, Standards and Deployment Considerations. Macmillan Technical Publishing, 1999.Google Scholar
  2. 2.
    D. M. Chess. Security Issues in Mobile Code Systems. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.CrossRefGoogle Scholar
  3. 3.
    W. Farmer, J. Guttman, and V. Swarup. Security for mobile agents: Authentication and state appraisal. In European Symposium on Research in Computer Security, number 1146 in LNCS. Springer-Verlag, 1996.Google Scholar
  4. 4.
    W. Farmer, J. Guttman, and V. Swarup. Security for mobile agents: Issues and requirements. In Computer Communications, Special Issue on Advances in Research and Application of Network Security, October 1996.Google Scholar
  5. 5.
    L. Gong. Java Security Architecture (JDK1.2). Technical report, Sun Microsystems, March 1998.Google Scholar
  6. 6.
    R. H. Guttman, A. G. Moukas, and P. Maes. Agents as mediators in electronic commerce. Electronic Markets, 8(1), May 1998.Google Scholar
  7. 7.
    F. Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.CrossRefGoogle Scholar
  8. 8.
    W. Jansen. Countermeasures for Mobile Agent Security. In Computer Communications, Special Issue on Advances in Research and Application of Network Security, November 2000.Google Scholar
  9. 9.
    N. Karnik. Security in Mobile Agent Systems. PhD thesis, Department of Computer Science and Engineering, University of Minnesota, 1998.Google Scholar
  10. 10.
    B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4), November 1992.Google Scholar
  11. 11.
    D. B. Lange and M. Oshima. Seven good reasons for mobile agents. Communications of the ACM, 42(3), 1999.Google Scholar
  12. 12.
    G. Necula and P. Lee. Safe kernel extensions without run-time checking. In Proceedings of the 2nd Symposium on Operating System Design and Implementation (OSDI’ 96), Washington, October 1996.Google Scholar
  13. 13.
    R. Oppliger. Security issues related to mobile code and agent-based systems. Computer Communications, 22(12), July 1999.Google Scholar
  14. 14.
    T. Sander and C. F. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.CrossRefGoogle Scholar
  15. 15.
    K. Schelderup and J. Ølnes. Mobile agent security-issues and directions. In Proceedings of the 6th International Conference on Intelligence and Services in Networks, Barcelona, Spain, April 1999.Google Scholar
  16. 16.
    V. Swarup and J.T. Fabrega. Trust: Benefits, models and mechanisms. In SecureInternet Programming: Security Issues for Mobile and Distributed Objects, number 1603 in LNCS. Springer-Verlag, 1999.Google Scholar
  17. 17.
    G. Vigna. Cryptographic traces for mobile agents. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.Google Scholar
  18. 18.
    D. Volpano and G. Smith. Language Issues in Mobile Program Security. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.CrossRefGoogle Scholar
  19. 19.
    R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proceedings of the 14th ACM Symposium on Operating Systems Principles, pages 203–216, December 1996.Google Scholar
  20. 20.
    U. G. Wilhelm, S. Staamann, and L. Buttyan. Introducing trusted third parties to the mobile agent paradigm. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, number 1603 in LNCS. Springer-Verlag, 1999.Google Scholar
  21. 21.
    R. Yahalom, B. Klein, and T. Beth. Trust relationships in secure systems-A distributed authentication perspective. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 150–164, 1993.Google Scholar
  22. 22.
    B. S. Yee. A sanctuary for mobile agents. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, number 1603 in LNCS. Springer-Verlag, 1999.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Hock Kim Tan
    • 1
  • Luc Moreau
    • 1
  1. 1.Department of Electronics and Computer ScienceUniversity of SouthamptonSouthamptonUK

Personalised recommendations