{"title":"LAVA: secure delegation of mobile applets: design, implementation and applications","authors":"Jatin N. Hansoty, M. Vouk, S. F. Wu","doi":"10.1109/ENABL.1997.630821","DOIUrl":null,"url":null,"abstract":"Mobile agents are tasks or processes which can be autonomously delegated or transferred from one network node to another: This distributed computing paradigm is modern and powerful. Many network-based applications have been developed or designed under this model. The application areas include, for example, intelligent agent, network and system management, web-based mobile applets, electronic commerce and more recently, active networking. While offering a new attractive paradigm over the Internet, this mobile agent technology introduces significant new security threats. For example, a malicious agent with certain access rights might be able to destroy critical information on the nodes it visits. LAVA is a proposed architecture to facilitate secure delegation of executable code. In this paper we present this architecture, its design, and our prototype implementation. One SNMP network management application has been developed on top of the LAVA prototype.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENABL.1997.630821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Mobile agents are tasks or processes which can be autonomously delegated or transferred from one network node to another: This distributed computing paradigm is modern and powerful. Many network-based applications have been developed or designed under this model. The application areas include, for example, intelligent agent, network and system management, web-based mobile applets, electronic commerce and more recently, active networking. While offering a new attractive paradigm over the Internet, this mobile agent technology introduces significant new security threats. For example, a malicious agent with certain access rights might be able to destroy critical information on the nodes it visits. LAVA is a proposed architecture to facilitate secure delegation of executable code. In this paper we present this architecture, its design, and our prototype implementation. One SNMP network management application has been developed on top of the LAVA prototype.