{"title":"移动代理面临的安全威胁","authors":"Snehi Jyoti, Snehi Manish, Sudha Goyal","doi":"10.1145/2007052.2007098","DOIUrl":null,"url":null,"abstract":"Mobile Agent is a software abstraction (a process) executing in self-governing manner and capable of suspending its execution on a host computer, moving from one agent-enabled host to another and continuing its execution on the destination node. This way mobile agent can migrate in a loosely coupled distributed environment across different nodes with its data intact to perform intended task.\n As the goal achievement is done by migrating mobile agents into networked computers it increasing the security risks. The paper identifies the application of mobile agents along with introduced threats to the system and generic security issues. In this paper we also propose work to implement the security layer for mobile agents for their authentication and authorization there by fulfilling security objectives.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security threats to mobile agents\",\"authors\":\"Snehi Jyoti, Snehi Manish, Sudha Goyal\",\"doi\":\"10.1145/2007052.2007098\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile Agent is a software abstraction (a process) executing in self-governing manner and capable of suspending its execution on a host computer, moving from one agent-enabled host to another and continuing its execution on the destination node. This way mobile agent can migrate in a loosely coupled distributed environment across different nodes with its data intact to perform intended task.\\n As the goal achievement is done by migrating mobile agents into networked computers it increasing the security risks. The paper identifies the application of mobile agents along with introduced threats to the system and generic security issues. In this paper we also propose work to implement the security layer for mobile agents for their authentication and authorization there by fulfilling security objectives.\",\"PeriodicalId\":348804,\"journal\":{\"name\":\"International Conference on Advances in Computing and Artificial Intelligence\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Advances in Computing and Artificial Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2007052.2007098\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Advances in Computing and Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2007052.2007098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mobile Agent is a software abstraction (a process) executing in self-governing manner and capable of suspending its execution on a host computer, moving from one agent-enabled host to another and continuing its execution on the destination node. This way mobile agent can migrate in a loosely coupled distributed environment across different nodes with its data intact to perform intended task.
As the goal achievement is done by migrating mobile agents into networked computers it increasing the security risks. The paper identifies the application of mobile agents along with introduced threats to the system and generic security issues. In this paper we also propose work to implement the security layer for mobile agents for their authentication and authorization there by fulfilling security objectives.