A Comprehensive Resource Management Framework for Next Generation Wireless Networks
IEEE Transactions on Mobile Computing
A configurable mobile agent data protection protocol
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
A security protocol for mobile agents based upon the cooperation of sedentary agents
Journal of Network and Computer Applications
Future Generation Computer Systems
Efficient migration for mobile computing in distributed networks
Computer Standards & Interfaces
Enforcing security in the AgentScape middleware
Proceedings of the 2008 workshop on Middleware security
Efficient migration access control for mobile agents
Computer Standards & Interfaces
Design of RBAC-based secure KAgent framework for home network applications
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
A novel key management and access control scheme for mobile agent
ICIC'06 Proceedings of the 2006 international conference on Intelligent computing: Part II
Secure execution of computations in untrusted hosts
Ada-Europe'06 Proceedings of the 11th Ada-Europe international conference on Reliable Software Technologies
A secure protocol for mobile agents in hostile environment
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
A Study on Agent-Based Secure Scheme for Electronic Medical Record System
Journal of Medical Systems
Secure Communication of Medical Information Using Mobile Agents
Journal of Medical Systems
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
A mobile agent represents a computation that can autonomously migrate in a network to perform tasks on behalf of its creator. This paper describes the security architecture of Ajanta, a Java-based system for mobile agent programming. This architecture provides mechanisms to protect server resources from malicious agents, agent data from tampering by malicious servers, and to protect the system infrastructure itself. An agent can carry three kinds of protected data: read-only objects, objects visible only to specific servers, and a secure append-only list of objects. Agents' access to server resources is controlled using a proxy-based mechanism. A generic authentication protocol is used for all sensitive client-server interactions. Ajanta also supports communication between remote agents using RMI, which can be controlled by the servers' security policies.