{"title":"在不可信的计算环境中实现移动代理安全","authors":"A. Wagner","doi":"10.1109/CONTEL.2005.185960","DOIUrl":null,"url":null,"abstract":"Many researchers have agreed on the validity of the observation that the use of mobile agent systems will not attain a critical mass unless the problem of security is solved. As mobile agents are most likely to be used in an untrusted environment (such as the Internet) the various components of the agent system are to be protected against security threats. If security is not guaranteed, sensitive user data may be leaked or forged. This paper offers an overview of possible approaches to counter the most notorious of agent system security threats, the one presented by malicious agent hosts. The requirements for protection against such attacks are outlined, and new methods of protection are also introduced. I. INTRODUCTION By most researchers, mobile agent systems are considered to be a viable alternative to client-server systems in certain applications. Some of the often recited advantages of mobile agents over client-server architectures are:","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Implementing mobile agent security in an untrusted computing environment\",\"authors\":\"A. Wagner\",\"doi\":\"10.1109/CONTEL.2005.185960\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many researchers have agreed on the validity of the observation that the use of mobile agent systems will not attain a critical mass unless the problem of security is solved. As mobile agents are most likely to be used in an untrusted environment (such as the Internet) the various components of the agent system are to be protected against security threats. If security is not guaranteed, sensitive user data may be leaked or forged. This paper offers an overview of possible approaches to counter the most notorious of agent system security threats, the one presented by malicious agent hosts. The requirements for protection against such attacks are outlined, and new methods of protection are also introduced. I. INTRODUCTION By most researchers, mobile agent systems are considered to be a viable alternative to client-server systems in certain applications. Some of the often recited advantages of mobile agents over client-server architectures are:\",\"PeriodicalId\":265923,\"journal\":{\"name\":\"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONTEL.2005.185960\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONTEL.2005.185960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementing mobile agent security in an untrusted computing environment
Many researchers have agreed on the validity of the observation that the use of mobile agent systems will not attain a critical mass unless the problem of security is solved. As mobile agents are most likely to be used in an untrusted environment (such as the Internet) the various components of the agent system are to be protected against security threats. If security is not guaranteed, sensitive user data may be leaked or forged. This paper offers an overview of possible approaches to counter the most notorious of agent system security threats, the one presented by malicious agent hosts. The requirements for protection against such attacks are outlined, and new methods of protection are also introduced. I. INTRODUCTION By most researchers, mobile agent systems are considered to be a viable alternative to client-server systems in certain applications. Some of the often recited advantages of mobile agents over client-server architectures are: