Table of Contents
Security in Mobile Agent Systems
Outline
Introduction
Evolution
The mobile agent paradigm
Security concerns
Research challenges
Research contributions
Research contributions...
1. The Ajanta system
Mobile agents in Java
Agent and Server structure
Agent credentials
Programming primitives
2. An authentication protocol
3. Secure agent transfer
Agent migration
The Agent Transfer Protocol
4. Secure agent execution
5. Protection of server resources
Resource binding protocol
Resource implementation
Access control in the proxy
Security against potential attacks
6. Secure agent communication
7. Protection of agent state
Read-only state protection
Read-only state protection
Append-only logs
Append-only logs
Targeted data
Targeted data
Agent programming support
Patterns for itinerary composition
Agent control primitives
Applications of mobile agents
The file system resource
File sharing: Interactions
Conclusions
Publications
Publications...
Future work
Notation
|
Author: Neeran Karnik
Email: karnik@cs.umn.edu
Home Page: http://www.cs.umn.edu/~karnik/
|