Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications
DOI: 10.1109/etacom.1996.502505
|View full text |Cite
|
Sign up to set email alerts
|

When agents roam, who can you trust?

Abstract: Roaming agents threaten a server with theft of assets, system resources and reputation. Generally ignored is the reciprocal threat of server against agent. Not only might a server steal the assets, resources, and reputation of an agent, but it might actually kill the agent. The central security concern for systems that allow agents to roam is how to establish trust, and how to limit risk for both the server and the agent. The travels of the agent are key to establishing trust, and trust determines the level of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(27 citation statements)
references
References 4 publications
0
27
0
Order By: Relevance
“…Ajanta [7] and SOMA 1 ) usually take the user's signature as an indication of the authority. -Path Histories [8]. The main idea of this technique is to keep a verifiable record of the platforms already visited by an agent, so that the next platform to be visited can determine if the agent will be processed and which resource restrictions will be applied.…”
Section: Security In Mobile Agent Platformsmentioning
confidence: 99%
“…Ajanta [7] and SOMA 1 ) usually take the user's signature as an indication of the authority. -Path Histories [8]. The main idea of this technique is to keep a verifiable record of the platforms already visited by an agent, so that the next platform to be visited can determine if the agent will be processed and which resource restrictions will be applied.…”
Section: Security In Mobile Agent Platformsmentioning
confidence: 99%
“…A one-hop agent is an agent that only migrates from one host to another and back, or it can also stay at the destination host. On the other hand, a multi-hop agent is a mobile agent that travels through many hosts [5]. For a multi-hop agent, the list of hosts visited is the path history.…”
Section: Path Patternmentioning
confidence: 99%
“…To enable the platform to answer these questions, a mobile agent should maintain an authenticated record of previously visited platform during its travel history. Using this history, the platform can make the decision whether to run the agent and what level of trust, services, resources and privileges should be granted to the agent [4,5].…”
Section: A Path Historymentioning
confidence: 99%
“…• sites can block out access by agents (Eichman, 1995); • agents roaming the server can threaten the server with theft of resources, assets and reputation (Ordille and Travis, 1996).…”
Section: Issues With Agent Technologiesmentioning
confidence: 99%