1998
DOI: 10.1007/3-540-68671-1_7
|View full text |Cite
|
Sign up to set email alerts
|

Authentication for Mobile Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2001
2001
2011
2011

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(23 citation statements)
references
References 8 publications
0
23
0
Order By: Relevance
“…Upon arrival at a remote node, a mobile agent presents its credentials, obtains access to local services and data to collect needed information or perform certain actions, and then departs with the results. One of the most important aspects of mobile agents is the security, which is not addressed here, but is being actively investigated [6], [7]. The transfer of partial fusion results by a mobile agent may still have the risk of being spied on with hostile intent; the serial data collection process employed by the mobile agent obviously decreases the chance of exposing the individual raw data.…”
Section: Introductionmentioning
confidence: 99%
“…Upon arrival at a remote node, a mobile agent presents its credentials, obtains access to local services and data to collect needed information or perform certain actions, and then departs with the results. One of the most important aspects of mobile agents is the security, which is not addressed here, but is being actively investigated [6], [7]. The transfer of partial fusion results by a mobile agent may still have the risk of being spied on with hostile intent; the serial data collection process employed by the mobile agent obviously decreases the chance of exposing the individual raw data.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, a digital certificate cannot be modified after being issued. While some research focuses on how to develop mutual authentication and authorization protocols [11], it is known that a single certificate certifying only the code provider is not enough to ensure security in mobile agent communities. Following similar lines of thoughts, Lai et al have described a method to electronically represent endorsements, licenses and insurance policies to build enhanced confidence in distributed systems [12].…”
Section: Introductionmentioning
confidence: 99%
“…Such logic can be used to verify the semantics of an agent system by linking system states with agent mental states. Berkovits et al (1998) propose trust relations in mobile agent environments based on Lampson et al's logic for authentication . They focus on three goals: certification of executing a mobile agent by a host, providing necessary privileges for agents to carry out their tasks, and ensuring the non-malicious state of an agent due to alterations imposed by the host.…”
Section: Trust Management: Distributed Access Controlmentioning
confidence: 99%