1998
DOI: 10.1007/3-540-68671-1_9
|View full text |Cite
|
Sign up to set email alerts
|

D’Agents: Security in a Multiple-Language, Mobile-Agent System

Abstract: Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we discuss these three issues in the context of D'Agents, a mobile-agent system whose agents can be written in Tcl, Java and Scheme. (D'Agents was formerly known as Agent Tcl.) First we discuss mechanisms existing in D'Agents for protecting an individual machine: (1) cryptographic authentication of the agent's owner, (2) resource managers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0
3

Year Published

2001
2001
2012
2012

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 119 publications
(55 citation statements)
references
References 22 publications
0
52
0
3
Order By: Relevance
“…Other approaches focused on addressing the security issues for mobile agent systems. This approach, such as (Gray et al, 1998), focused on authentication to verify the agent's owners, authorization to assign access restrictions and enforcement to ensure that the agent does not violate these restrictions.…”
Section: Mas Design Implementation and Simulation In Cdssmentioning
confidence: 99%
“…Other approaches focused on addressing the security issues for mobile agent systems. This approach, such as (Gray et al, 1998), focused on authentication to verify the agent's owners, authorization to assign access restrictions and enforcement to ensure that the agent does not violate these restrictions.…”
Section: Mas Design Implementation and Simulation In Cdssmentioning
confidence: 99%
“…In this respect, refer to Section 4.1. D'Agents [35], an agent system that cannot necessarily exploit Java security, makes use of PGP (Pretty Good Privacy) [36] to generate asymmetric RSA keys, though this results in a reduction in efficiency, as PGP is not tightly integrated into the system.…”
Section: Ma Security Issuesmentioning
confidence: 99%
“…This framework will then be used to define some general attack classes, which can then be instantiated on particular systems. The definitions presented in this section were obtained by the analysis of a number of existing systems and their security models [8,9,12,14], as well as by the OMG's MASIF specification [10].…”
Section: General Framework For the Analysismentioning
confidence: 99%
“…In this case, mobile components can explicitly relocate themselves across the network, usually preserving their execution state (or part thereof) across migrations. Examples of systems supporting this type of mobility are Telescript [17] and D'Agents [8].…”
Section: Introductionmentioning
confidence: 99%