Magicnet: Security architecture for authorization of mobile agents
2009 (English)In: Proceedings of the 3rd International Conference on Internet Technologies and Applications, ITA 09, 2009, 506-513 p.Conference paper (Refereed)
Controlling access to resources at remote hosts by mobile agents during their execution is a challenging problem. Current solutions use mainly methodology that detects agents' incorrect access attempts to a particular resource. For that purpose agents' execution logs are checked in order to identify malicious activities or misuse of resources at a particular host. As an alternative, instead of detective approach, we focus on preventive approach for control of access by mobile agents. While detective approach may provide some protection, its primary shortcoming is that it does not provide protection of resources in advance, before access, and in fact requires post-fact manual intervention and activation of countermeasures. With our solution we provide a solution to authenticate and authorize agents at remote hosts before executing any action. The architecture of our system is based on RBAC XACML policies and SAML standards.
Place, publisher, year, edition, pages
2009. 506-513 p.
Mobile agents authorization, Role base access control, XACML polices
IdentifiersURN: urn:nbn:se:kth:diva-152418ScopusID: 2-s2.0-84857732715ISBN: 978-094688165-9OAI: oai:DiVA.org:kth-152418DiVA: diva2:750805
3rd International Conference on Internet Technologies and Applications, ITA 09, 8 September 2009 through 11 September 2009, Wrexham, Wales, United Kingdom
QC 201409302014-09-302014-09-262014-09-30Bibliographically approved