Skip to main content

Reliable Cascaded Delegation Scheme for Mobile Agent Environments

  • Conference paper
Information Security Applications (WISA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2908))

Included in the following conference series:

  • 351 Accesses

Abstract

In mobile agent environments, migration of an agent occurs continuously due to the mobility of the agent. So, cascaded delegation can occur among places for delegating the privilege to execute the agent. Because the existing delegation scheme considers only the delegation between two places that participate in migration of an agent, it does not support secure cascaded delegation. In this paper, we propose a cascaded delegation scheme that provides agents with secure cascaded delegation in mobile agent environments. Depending on the trust-relationship among places, the proposed scheme achieves the goal by nesting each delegation token or by nesting only initial token signed by sender of the agent within the signed part of the next immediate delegation token. We prove that the proposed scheme is secure against the attack of replaying a message and the attack of substituting a delegation token.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Harrison, C., Chess, D., Kershenbaum, A.: Mobile Agents: Are they a good idea? Research Report (1987), IBM Research Division (1994)

    Google Scholar 

  2. Berkovits, S., Guttman, J., Swarup, V.: Authentication for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 114–136. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Farmer, W., Guttman, J., Swarup, V.: Security for mobile agents: issues and requirements. Computer Communications: Special Issue on Advances in Research and Application of Network Security (1996)

    Google Scholar 

  4. Jansen, W.: Countermeasures for mobile agent security. Computer Communications: Special Issue on Advances in Research and Application of Network Security (2000)

    Google Scholar 

  5. Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents protection in the internet environment. In: Proc. 23th Annual International Computer Software and Applications Conference, pp. 80–85 (1999)

    Google Scholar 

  6. Wilhelm, U., Stamann, S., Buttyan, L.: A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing 4(5), 40–48 (2000)

    Article  Google Scholar 

  7. Ding, Y., Petersen, H.: A new approach for delegation using hierarchical delegation tokens. In: Proc. 2nd Conference on Computer and Communications Security, pp. 128–143 (1996)

    Google Scholar 

  8. Vogt, G.: Delegation of tasks and rights. In: Proc. 12th Annual IFIP/IEEE International Workshop on Distributed systems: Operations & Management, pp. 327–337 (2001)

    Google Scholar 

  9. Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Language and Systems 15(4), 706–734 (1993)

    Article  Google Scholar 

  10. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. In: Proc. 13th ACM Symposium on Operating Systems Principles, pp. 165–182 (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, Hs., Kwon, H.M., Eom, Y.I. (2004). Reliable Cascaded Delegation Scheme for Mobile Agent Environments. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24591-9_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20827-3

  • Online ISBN: 978-3-540-24591-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics