Skip to main content

Trust Enhanced Authorization for Mobile Agents

  • Conference paper
Book cover E-Commerce and Web Technologies (EC-Web 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5692))

Included in the following conference series:

Abstract

Trust has been recognized as an important aspect for mobile agent security. In this paper, we develop a logic based trust model which enables the capturing of a comprehensive set of trust relationships to enhance the security of conventional access control mechanisms in a mobile based applications. We first discuss the notion of trust and its relevance to mobile agent security. Next we define a logic program based language to facilitate the modelling process. To enforce the security related trustworthy behaviours, we then define a set of general rules to capture the semantics. Finally, the language is applied in a mobile agent context to demonstrate how the trust can be explicitly modelled and reasoned about to support better security decisions for the mobile agent based systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. on programming languages and systems 15(4), 706–734 (1993)

    Article  Google Scholar 

  2. Blaze, M., Feigenhaum, J., Strauss, M.: Decentralized trust management. In: Proceedings of the 1996 IEEE Conference on Security and Privacy, pp. 164–173 (1996)

    Google Scholar 

  3. Berkovits, S., Guttman, J.D., Swarup, V.: Authentication for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 114. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Gelfond, M., Lifschitz, V.: Classical negation in logic programs and disjunctive databases. New Generation Computing 9, 365–385 (1991)

    Article  MATH  Google Scholar 

  5. Kurkowski, M., Pejas, J.: A propositional logic for access control policy in distributed systems. In: Artificial Intelligence and Security in Computing Systems, pp. 175–189 (2003)

    Google Scholar 

  6. Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: Proceedings of 7th USENIX Security Symposium (1998)

    Google Scholar 

  7. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. ACM Trans. on Computer Systems 10(4), 265–310 (1992)

    Article  Google Scholar 

  8. Maurer, U.: Modelling a public-key infrasturcture. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146. Springer, Heidelberg (1996)

    Google Scholar 

  9. McKnight, D.H., Chervany, N.L.: The meanings of trust. Tech- nical Report, MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Reseach Center (1996), http://misrc.umn.edu/wpaper/

  10. Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logic language for expressing authorizations. In: Proc. IEEE Symp. on Research in Security and Privacy, pp. 31–42 (1997)

    Google Scholar 

  11. Tan, H.K., Moreau, L.: Trust relationships in a mobile agent system. In: Proc. of Fifth IEEE International Conference on Mobile Agents (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ruan, C., Varadharajan, V. (2009). Trust Enhanced Authorization for Mobile Agents. In: Di Noia, T., Buccafurri, F. (eds) E-Commerce and Web Technologies. EC-Web 2009. Lecture Notes in Computer Science, vol 5692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03964-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03964-5_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03963-8

  • Online ISBN: 978-3-642-03964-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics