{"title":"Ara移动代理系统中的安全概念及实现","authors":"H. Peine","doi":"10.1109/ENABL.1998.725699","DOIUrl":null,"url":null,"abstract":"We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable systems. The Ara model features few principals, a simple authentication and encryption API, and a simple but highly customizable authorization scheme. One system may contain many virtual places, each establishing a domain of logically related services under a common security policy governing all agents at this place. Agents are equipped with allowances limiting their resource accesses, both globally per agent lifetime and locally per place. Various aspects of the implementation of this model are discussed, and finally the situation and limitations of Ara and other systems are summarized.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"37","resultStr":"{\"title\":\"Security concepts and implementation in the Ara mobile agent system\",\"authors\":\"H. Peine\",\"doi\":\"10.1109/ENABL.1998.725699\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable systems. The Ara model features few principals, a simple authentication and encryption API, and a simple but highly customizable authorization scheme. One system may contain many virtual places, each establishing a domain of logically related services under a common security policy governing all agents at this place. Agents are equipped with allowances limiting their resource accesses, both globally per agent lifetime and locally per place. Various aspects of the implementation of this model are discussed, and finally the situation and limitations of Ara and other systems are summarized.\",\"PeriodicalId\":321059,\"journal\":{\"name\":\"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)\",\"volume\":\"136 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"37\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ENABL.1998.725699\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENABL.1998.725699","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security concepts and implementation in the Ara mobile agent system
We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable systems. The Ara model features few principals, a simple authentication and encryption API, and a simple but highly customizable authorization scheme. One system may contain many virtual places, each establishing a domain of logically related services under a common security policy governing all agents at this place. Agents are equipped with allowances limiting their resource accesses, both globally per agent lifetime and locally per place. Various aspects of the implementation of this model are discussed, and finally the situation and limitations of Ara and other systems are summarized.