Title :
Security in mobile agent systems
Author :
Sameh, Ahmed ; Fakhry, Dalia
Author_Institution :
Dept. of Comput. Sci., American Univ. in Cairo, Egypt
Abstract :
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agents to agents and finally from hosts to agents. Our main concern is attacks from a malicious host on an agent. These attacks can take many forms including rerouting, spying out code, spying out data, spying out control flow, manipulation of code, manipulation of data, manipulation of control flow, incorrect execution of code, masquerading and denial of execution. This paper presents a three-tier solution of code mess up, encryption and time out
Keywords :
Internet; cryptography; software agents; telecommunication security; Internet; code manipulation; code mess up; code spying; control flow manipulation; control flow spying; data manipulation; data spying; denial of execution; encryption; incorrect code execution; malicious host; masquerading; mobile agent systems; rerouting; security attacks; three-tier solution; time out; Code standards; Computer science; Computer security; Costs; Cryptography; Data security; Libraries; Mobile agents; Protection; Time factors;
Conference_Titel :
Applications and the Internet, 2002. (SAINT 2002). Proceedings. 2002 Symposium on
Conference_Location :
Nara
Print_ISBN :
0-7695-1447-2
DOI :
10.1109/SAINT.2002.994431