Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Magicnet: Security architecture for authorization of mobile agents
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
2009 (English)In: Proceedings of the 3rd International Conference on Internet Technologies and Applications, ITA 09, 2009, 506-513 p.Conference paper, Published paper (Refereed)
Abstract [en]

Controlling access to resources at remote hosts by mobile agents during their execution is a challenging problem. Current solutions use mainly methodology that detects agents' incorrect access attempts to a particular resource. For that purpose agents' execution logs are checked in order to identify malicious activities or misuse of resources at a particular host. As an alternative, instead of detective approach, we focus on preventive approach for control of access by mobile agents. While detective approach may provide some protection, its primary shortcoming is that it does not provide protection of resources in advance, before access, and in fact requires post-fact manual intervention and activation of countermeasures. With our solution we provide a solution to authenticate and authorize agents at remote hosts before executing any action. The architecture of our system is based on RBAC XACML policies and SAML standards.

Place, publisher, year, edition, pages
2009. 506-513 p.
Keyword [en]
Mobile agents authorization, Role base access control, XACML polices
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-152418Scopus ID: 2-s2.0-84857732715ISBN: 978-094688165-9 (print)OAI: oai:DiVA.org:kth-152418DiVA: diva2:750805
Conference
3rd International Conference on Internet Technologies and Applications, ITA 09, 8 September 2009 through 11 September 2009, Wrexham, Wales, United Kingdom
Note

QC 20140930

Available from: 2014-09-30 Created: 2014-09-26 Last updated: 2014-09-30Bibliographically approved

Open Access in DiVA

No full text

Scopus

Search in DiVA

By author/editor
Shibli, Muhammad AwaisMuftic, Sead
By organisation
Computer and Systems Sciences, DSV
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 19 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf