2001
DOI: 10.1002/spe.364
|View full text |Cite
|
Sign up to set email alerts
|

Security in the Ajanta mobile agent system

Abstract: A mobile agent is an object which can autonomously migrate in a distributed system to perform tasks on behalf of its creator. Security issues in regard to the protection of host resources, as well as the agent themselves, raise significant obstacles in practical applications of the agent paradigm. This article describes the security architecture of Ajanta, a Java‐based system for mobile agent programming. This architecture provides mechanisms to protect server resources from malicious agents, agent data from t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0
2

Year Published

2004
2004
2013
2013

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 113 publications
(71 citation statements)
references
References 23 publications
0
69
0
2
Order By: Relevance
“…This allows for selective disclosure of agent state (Karnik, 1998). In.addition, the programmer can use empiric methods -as in (Hohl, 1998) -to prevent disclosure of agents' sensitive data by malicious platforms.…”
Section: 2-security Scheme Based On Spkiisdsi Chain Of Trustmentioning
confidence: 99%
“…This allows for selective disclosure of agent state (Karnik, 1998). In.addition, the programmer can use empiric methods -as in (Hohl, 1998) -to prevent disclosure of agents' sensitive data by malicious platforms.…”
Section: 2-security Scheme Based On Spkiisdsi Chain Of Trustmentioning
confidence: 99%
“…Though agent cooperation is possible in SNMP servicing, in this paper inter-agent messaging is not part of the core system. The Java-based Ajanta system [34] actively addresses some of the security related aspects of mobile agents. Ajanta offers a mechanism for authenticated communications, whenever an agent is to be transferred between two servers.…”
Section: Ma Security Issuesmentioning
confidence: 99%
“…Among them is host protection, for which mobile agents have proposed solutions based on cryptographic authentication of the agent's owner. Examples of such systems are Telescript [25], IBM Itinerant Agents [6], Ajanta [15], and D'Agents [10]. The existing solutions control the access to resources on the recipient host by using capability lists or access control lists (ACL).…”
Section: Related Workmentioning
confidence: 99%
“…Although the security for both mobile agents [10,15] and ad hoc networks [22,12] have been extensively studied, this is the first attempt (to the best of our knowledge) to investigate the security issues for a system based on code migration over mobile ad hoc networks. Given the complexity of the problem, our intentions are threefold: identify the unique challenges faced by such a system, design an extensible framework for SM security which provides solutions for the basic, but critical SM security requirements, and present the open issues that remain to be solved.…”
Section: Introductionmentioning
confidence: 99%