Security in Mobile Agent Systems

10/12/98


Click here to start


Table of Contents

Security in Mobile Agent Systems

Outline

Introduction

Evolution

The mobile agent paradigm

Security concerns

Research challenges

Research contributions

Research contributions...

1. The Ajanta system

Mobile agents in Java

Agent and Server structure

Agent credentials

Programming primitives

2. An authentication protocol

3. Secure agent transfer

Agent migration

The Agent Transfer Protocol

4. Secure agent execution

5. Protection of server resources

Resource binding protocol

Resource implementation

Access control in the proxy

Security against potential attacks

6. Secure agent communication

7. Protection of agent state

Read-only state protection

Read-only state protection

Append-only logs

Append-only logs

Targeted data

Targeted data

Agent programming support

Patterns for itinerary composition

Agent control primitives

Applications of mobile agents

The file system resource

File sharing: Interactions

Conclusions

Publications

Publications...

Future work

Notation

Author: Neeran Karnik

Email: karnik@cs.umn.edu

Home Page: http://www.cs.umn.edu/~karnik/