Using Z: specification, refinement, and proof
Using Z: specification, refinement, and proof
Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
Supporting reconfigurable security policies for mobile programs
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
ACM Transactions on Information and System Security (TISSEC)
Mobile agent evolution computing
Information Sciences: an International Journal
A Structure Preserving Encoding of Z in Isabelle/HOL
TPHOLs '96 Proceedings of the 9th International Conference on Theorem Proving in Higher Order Logics
ZUM '97 Proceedings of the 10th International Conference of Z Users on The Z Formal Specification Notation
Enforcing History-Based Security Policies in Mobile Agent Systems
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Foundations of AOP for J2EE Development (Foundation)
Foundations of AOP for J2EE Development (Foundation)
Application Security Models for Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
A flexible policy architecture for mobile agents
SOFSEM'06 Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science
Countermeasures for mobile agent security
Computer Communications
Modeling secure mobile agent systems
KES-AMSTA'12 Proceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications
Hi-index | 0.00 |
We define in this paper, a formal conceptual model, which presents the most fundamental concepts for mobile agent systems and unifies their representation and defines the relations between them. On this base, we propose a formal security framework which consists of three basic frameworks. The specification framework proposes a generic definition of security policies for the entities of mobile agent systems. The verification framework checks the intra-policy consistency. The reconfiguration framework describes how to reconfigure security policies and to maintain their consistency. Finally, we examine this theoretical work by defining an operational framework for dynamic enforcement of security policies.