𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Countermeasures for mobile agent security

✍ Scribed by W.A Jansen


Book ID
104273622
Publisher
Elsevier Science
Year
2000
Tongue
English
Weight
157 KB
Volume
23
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.

✦ Synopsis


Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. However, not all applications require the same set of countermeasures, nor can they depend entirely on the agent system to provide them. Instead, countermeasures are applied commensurate with the anticipated threat profile and intended security objectives for the application. While countermeasures typically include any action, device, procedure, technique, or other measure that reduces the vulnerability of or threat to a system, our focus here is specifically on technical mechanisms, as opposed to procedural or non-technical measures. Such countermeasures can be integrated directly into an agent system, or incorporated into the design of an agent to supplement the capabilities of an underlying agent system. This paper gives an overview of the threats associated with software agent systems and their technical countermeasures, including the strengths and weaknesses of the techniques involved. Emphasis is on mobile software agents, since they typically face a more severe set of threats than do static agents and, therefore, demand more rigorous countermeasures.


πŸ“œ SIMILAR VOLUMES


Path-based Security for Mobile Agents
✍ Gerald Knoll; Niranjan Suri; Jeffrey M. Bradshaw πŸ“‚ Article πŸ“… 2002 πŸ› Elsevier Science 🌐 English βš– 211 KB
Secure mobile agents with controlled res
✍ Qi Zhang; Yi Mu; Minjie Zhang; Robert H. Deng πŸ“‚ Article πŸ“… 2010 πŸ› John Wiley and Sons 🌐 English βš– 195 KB

## Abstract Mobile agents often travel in a hostile environment where their security and privacy could be compromised by any party including remote hosts in which agents visit and get services. It is believed that the host visited by an agent should jointly sign a service agreement with the agent's