Security enhanced mobile agents
Proceedings of the 7th ACM conference on Computer and communications security
Cross-domain one-shot authorization using smart cards
Proceedings of the 7th ACM conference on Computer and communications security
Automated cross-organisational trust establishment on extranets
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
Practical Intranet Security: Overview of the State of the Art and Available Technologies
Practical Intranet Security: Overview of the State of the Art and Available Technologies
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Safe, Untrusted Agents Using Proof-Carrying Code
Mobile Agents and Security
An Authorization Scheme For Distributed Object Systems
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Mobile agents: preserving privacy and anonymity
IMTCI'04 Proceedings of the Second international conference on Intelligent Media Technology for Communicative Intelligence
Hi-index | 0.00 |
New portable computers and wireless communication technologies have significantly enhanced mobile computing. The emergence of network technology that supports user mobility and universal network access has prompted new requirements and concerns, especially in the aspects of access control and security. In this paper, we propose a new approach using authorisation agents for cross-domain access control in a mobile computing environment. Our framework consists of three main components, namely centralised authorisation servers, authorisation tokens and authorisation agents. An infrastructure of centralised authorisation servers and application servers from different domains is proposed for supporting trust propagation to mobile hosts instantaneously. While the authorisation token is a form of static capability, the authorisation agent on the client side can be regarded as a dynamic capability to provide the functionality in client-server interactions. It works collaboratively with remote servers to provide authorisation service with finer access granularity and higher flexibility.