Javascript must be enabled to continue!
Security in the Ajanta mobile agent system
View through CrossRef
AbstractA mobile agent is an object which can autonomously migrate in a distributed system to perform tasks on behalf of its creator. Security issues in regard to the protection of host resources, as well as the agent themselves, raise significant obstacles in practical applications of the agent paradigm. This article describes the security architecture of Ajanta, a Java‐based system for mobile agent programming. This architecture provides mechanisms to protect server resources from malicious agents, agent data from tampering by malicious servers and communication channels during its travel, and protection of name service data and the global namespace. We present here a proxy based mechanism for secure access to server resources by agents. Using Java's class loader model and thread group mechanism, isolated execution domains are created for agents at a server. An agent can contain three kinds of protected objects: read‐only objects whose tampering can be detected, encrypted objects for specific servers, and a secure append‐only log of objects. A generic authentication protocol is used for all client–server interactions when protection is required. Using this mechanism, the security model of Ajanta enforces protection of namespaces, and secure execution of control primitives such as agent recall or abort. Ajanta also supports communication between agents using RMI, which can be controlled if required by the servers' security policies. Copyright © 2001 John Wiley & Sons, Ltd.
Title: Security in the Ajanta mobile agent system
Description:
AbstractA mobile agent is an object which can autonomously migrate in a distributed system to perform tasks on behalf of its creator.
Security issues in regard to the protection of host resources, as well as the agent themselves, raise significant obstacles in practical applications of the agent paradigm.
This article describes the security architecture of Ajanta, a Java‐based system for mobile agent programming.
This architecture provides mechanisms to protect server resources from malicious agents, agent data from tampering by malicious servers and communication channels during its travel, and protection of name service data and the global namespace.
We present here a proxy based mechanism for secure access to server resources by agents.
Using Java's class loader model and thread group mechanism, isolated execution domains are created for agents at a server.
An agent can contain three kinds of protected objects: read‐only objects whose tampering can be detected, encrypted objects for specific servers, and a secure append‐only log of objects.
A generic authentication protocol is used for all client–server interactions when protection is required.
Using this mechanism, the security model of Ajanta enforces protection of namespaces, and secure execution of control primitives such as agent recall or abort.
Ajanta also supports communication between agents using RMI, which can be controlled if required by the servers' security policies.
Copyright © 2001 John Wiley & Sons, Ltd.
Related Results
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices. Object...
Parent's Perception Regarding the Effects of Excessive Use of Mobile Phone on Children's Health: A Sociological Study in City Dera Ghazi Khan
Parent's Perception Regarding the Effects of Excessive Use of Mobile Phone on Children's Health: A Sociological Study in City Dera Ghazi Khan
The use of mobile phones among children has major effects on their health. Excessive and unrestricted use of mobile phones can contribute to various physical and psychological prob...
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
Mobile money refers to performing monetary transactions using telecommunications networks. This activity is intended to be referred to as "mobile money." The rapid use of mobile m...
PORTRAYAL OF WOMAN IN THE CAVE PAINTINGS OF AJANTA
PORTRAYAL OF WOMAN IN THE CAVE PAINTINGS OF AJANTA
The thirty rock cut cave temples of Ajanta located near a village named “Ajistha” in Aurangabad district of Maharashtra state. The caves are carved in a half crescent shape overloo...
Everyday Life in the "Tourist Zone"
Everyday Life in the "Tourist Zone"
This article makes a case for the everyday while on tour and argues that the ability to continue with everyday routines and social relationships, while at the same time moving thro...
Human Intervention for Searching Targets Using Mobile Agents in a Multi-Robot Environment
Human Intervention for Searching Targets Using Mobile Agents in a Multi-Robot Environment
We propose an intelligent interface for the mobile software agents that we have developed. The interface should have two roles. One is to visualize the mobile software agents using...
Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite
Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite
Penelitian berjudul “Analisis SWOT Mobile Dictionary Pleco dan Hanping Lite†dirancang sebagai pedoman pengguna untuk menentukan Mobile Dictionary yang sesuai dengan kebutuhan ...
Video tutorial pendaftaran mobile JKN dapat meningkatkan pemahaman pasien BPJS kesehatan
Video tutorial pendaftaran mobile JKN dapat meningkatkan pemahaman pasien BPJS kesehatan
Background: The national health insurance mobile application is used for registration of social security administrator patients who want to seek treatment at health service facilit...

