{"title":"基于代理的系统中的安全考虑","authors":"D. Chess","doi":"10.1109/ETACOM.1996.502504","DOIUrl":null,"url":null,"abstract":"Agent systems face all the security challenges involved with any system that sends messages. Delegating tasks to mobile programs, or to supposedly intelligent ones, raises another set of concerns. Agent-based systems also increase the connectedness and the complexity of the computing universe. As connectedness and complexity increase, new failure modes arise, some of which have security implications. These emergent security concerns are more speculative than the more traditional ones inherited from previous computing systems; the author mentions a few of the possibilities. The topics discussed include: controlling program execution, protecting agents, accidental agents, trusting data, and revealing data.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"227 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Security considerations in agent-based systems\",\"authors\":\"D. Chess\",\"doi\":\"10.1109/ETACOM.1996.502504\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Agent systems face all the security challenges involved with any system that sends messages. Delegating tasks to mobile programs, or to supposedly intelligent ones, raises another set of concerns. Agent-based systems also increase the connectedness and the complexity of the computing universe. As connectedness and complexity increase, new failure modes arise, some of which have security implications. These emergent security concerns are more speculative than the more traditional ones inherited from previous computing systems; the author mentions a few of the possibilities. The topics discussed include: controlling program execution, protecting agents, accidental agents, trusting data, and revealing data.\",\"PeriodicalId\":130942,\"journal\":{\"name\":\"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications\",\"volume\":\"227 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1996-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETACOM.1996.502504\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETACOM.1996.502504","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Agent systems face all the security challenges involved with any system that sends messages. Delegating tasks to mobile programs, or to supposedly intelligent ones, raises another set of concerns. Agent-based systems also increase the connectedness and the complexity of the computing universe. As connectedness and complexity increase, new failure modes arise, some of which have security implications. These emergent security concerns are more speculative than the more traditional ones inherited from previous computing systems; the author mentions a few of the possibilities. The topics discussed include: controlling program execution, protecting agents, accidental agents, trusting data, and revealing data.