Network management by delegation—from research prototypes towards standards
Selected papers of the 8th joint European conference on Networking
History-based access control for mobile code
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Integrated management of networked systems: concepts, architectures, and their operational application
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Proceedings of the Second International Workshop on Mobile Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Mobile Agents and Security
Stationary vs. Mobile User Agents in Future Mobile Telecommunication Networks
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Enabling a Mobile Network Manager (MNM) Through Mobile Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Authentication for Mobile Agents
Mobile Agents and Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Distributed management by delegation
ICDCS '95 Proceedings of the 15th International Conference on Distributed Computing Systems
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Mobile agents for network management
IEEE Communications Surveys & Tutorials
IEEE Communications Magazine
Hi-index | 0.00 |
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive role in terms of acceptance and applicability of mobile agents. In this paper, we analyze the threats and attacks against mobile agent systems used for management purposes. Therefore, general models of mobile agent based management systems are developed. Based on a risk analysis of these models we derive security requirements. In order to satisfy these requirements components and services are identified and integrated in comprehensive security architecture.