Policy-based authentication for mobile agents

  • Authors:
  • Yikai Wang;Yi Mu;Minjie Zhang

  • Affiliations:
  • School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia;School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia;School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia

  • Venue:
  • ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Mobile agents have exhibited many useful applications in ecommerce. Security is critical to ensure a success of mobile agent applications. There exist several solutions for mobile agent security. Amongst these solutions, the proxy-based model is believed to be a sound solution to provide authentication, where the visiting host of an agent acts as a proxy signer who can sign an offer. However, any host (including a malicious host) could act as the signer. To solve this problem, a secure policy-based mobile agent scheme is proposed in this paper. That is, only the hosts who satisfy the designated policies can generate a valid signature. We also provide a security model and a rigorous security proof for our proposed scheme.