Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
2009 (English)In: 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS, - UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, TAEJON: ELECTRONICS TELECOMMUNICATIONS RESEARCH INST , 2009, 1467-1471 p.Conference paper, Published paper (Refereed)
Abstract [en]

Most of the current research and development results dealing with security of mobile agents describe solutions only for usage of mobile agents. These contributions usually assume agents posses unique and recognizable identities, cryptographic keys, assigned assurance level, and various other security parameters. But, very few papers describe how to create, classify, and evaluate mobile agents before their adoption and deployment. These are the issues we address in this paper: how mobile agents are created, validated, tested, and classified before their deployment. Based on certain security parameters, we establish classification scheme for mobile agents into three assurance levels: low, medium, and high. Our solution and procedures are based on a comprehensive security service-oriented architecture. We also describe roles, procedures, and security components used in that architecture. The most important results are the definition of assurance levels for mobile agents and procedures for their classification into those assurance levels.

Place, publisher, year, edition, pages
TAEJON: ELECTRONICS TELECOMMUNICATIONS RESEARCH INST , 2009. 1467-1471 p.
Keyword [en]
Trusted Mobile Agents, Assurance Level, Mobile Agents Security
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:kth:diva-30775ISI: 000268233600293Scopus ID: 2-s2.0-67649889473ISBN: 978-89-5519-138-7 (print)OAI: oai:DiVA.org:kth-30775DiVA: diva2:404732
Conference
11th International Conference on Advanced Communication Technology Phoenix Pk, SOUTH KOREA, FEB 15-18, 2009
Note
QC 20110318Available from: 2011-03-18 Created: 2011-03-04 Last updated: 2011-03-18Bibliographically approved

Open Access in DiVA

No full text

Other links

ScopusIEEEXplore

Search in DiVA

By author/editor
Shibli, Muhammad AwaisMuftic, Sead
By organisation
Communication Systems, CoS
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 14 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf