Skip to main content

Mobile Agent Security — Issues and Directions

  • Conference paper
  • First Online:
Intelligence in Services and Networks Paving the Way for an Open Service Market (IS&N 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1597))

Included in the following conference series:

Abstract

It is obvious that a prerequisite for use of mobile agent systems in many settings is that security is taken care of. A proper trust model is necessary in order to build security. Many security issues arise if the trust model implies that not all hosts are trusted. This paper discusses trust models, examines the security issues, and points at possible directions for solutions in terms of security services, mechanisms, and protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A Calculus for Access Control in Distributed Systems, ACM Transactions on Programming Languages and Systems, 15(4) (1993)

    Google Scholar 

  2. ACTS Agent Cluster: http://www.fokus.gmd.de/research/cc/ima/climate/entry.html

  3. Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant Agents for Mobile Computing, IBM Research Report RC 20010 (03/27/95) (1995)

    Google Scholar 

  4. Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Issues and Requirements, Proceedings of the National Information Systems Security Conference (1996)

    Google Scholar 

  5. Fritzinger, J.S., Mueller, M.: Java Security Whitepaper, Sun Microsystems Inc. (1996)

    Google Scholar 

  6. Gray, R.: AgentTCL: A Flexible and Secure Mobile Agent System, Proceedings of 4th Annual USENIX TcL/Tk Workshop (1996)

    Google Scholar 

  7. IBM Research: Things that Go Bump in the Net, IBM Research Division, T.J. Watson Research Center (1995)

    Google Scholar 

  8. ITU-T X.810-816 ISO/IEC 10181/1-7: OSI-Security Frameworks for Open Systems (1996)

    Google Scholar 

  9. Johansen, D., van Renesse, R., Schneider, F.B.: An Introduction to the TACOMA Distributed System, Version 1.0, Technical Report 95-23, Department of Computer Science, University of Tromsø (1995)

    Google Scholar 

  10. Kaliski, B.: PKCS#7: Cryptographic Message Syntax Version 1.5, RFC2315 (1998)

    Google Scholar 

  11. Karjoth, G., Lange, D.B., Oshima, M.: A Security Model for Aglets, IEEE Internet Communication (1997)

    Google Scholar 

  12. Kristoffersen, T.: A Security Architecture for Open Distributed Processing, Dr.Scient. thesis 14, University of Oslo (1998)

    Google Scholar 

  13. McMahon, P.V.: SESAME V2 Public Key and Authorization Extensions to Kerberos, Proceedings of the ISOC Symposium on Network and Distributed Systems Security (1995)

    Google Scholar 

  14. OMG Joint Submission by Crystaliz Inc, General Magic Inc, GMD FOKUS, IBM, TOG: Mobile Agent System Interoperability Facility (1997)

    Google Scholar 

  15. Pretty Good Privacy (PGP) international homepage: http://www.ifi.uio.no/pgp

  16. Schelderup, K.: Security of Mobile Agents (in Norwegian), NR Report 921, Norwegian Computing Centre (NR) (1997)

    Google Scholar 

  17. Schneider, F.B.: Towards Fault-tolerant and Secure Agentry, Proceedings of the 11th International Workshop on Distributed Algorithms (1997)

    Google Scholar 

  18. Secure Sockets Layer (SSL): http://www.netscape.com

  19. Steiner, J.G., Neumann, C., Schiller, J.I.: Kerberos: An Authentication System for Open Network Systems, Proceedings of the 1988 Winter USENIX Conference (1988)

    Google Scholar 

  20. Tardo, J., Valente, L.: Mobile Agent Security and Telescript, Proceedings of the IEEE Compcon’ 96 Conference (1996)

    Google Scholar 

  21. Yee, B.S.; A Sanctuary for Mobile Agents, DARPA Workshop on Foundations for Secure Mobile Code (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schelderup, K., Ølnes, J. (1999). Mobile Agent Security — Issues and Directions. In: Zuidweg, H., Campolargo, M., Delgado, J. (eds) Intelligence in Services and Networks Paving the Way for an Open Service Market. IS&N 1999. Lecture Notes in Computer Science, vol 1597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48888-X_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-48888-X_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65895-5

  • Online ISBN: 978-3-540-48888-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics