Title :
Proactive mobile agent security:A new access control approach based on the risk analysis
Author :
Dhouib, Hedi ; Loukil, Adlen ; Ammari, Ahmed Chiheb ; Jemai, Abderrazek
Author_Institution :
Lab. MMA, Nat. Inst. of Appl. Sci. & Technol. (INSAT), Tunis, Tunisia
Abstract :
The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. So, with today´s complex, heterogeneous, and large networks, IT experts become more and more pressed to ensure high performing and highly available secure networking, notably with the emergence of the distributed systems and the rise of the users needs in this field where the birth of the agent technologies. Despite its numerous practical benefits and promises to provide an efficient way of mitigation complex distributed problems, mobile agent technologies still lacks an effective security measure which severely restricts its scope of applicability. As a consequence, management of the security of the mobile agent systems is a real challenge exceeding the capacity of the traditional reactive security methods mainly in case we are exposed to different risks and to newly created attacks. We do then need to adopt a proactive analysis approach that will continually check, evaluate and enhance the network capacity and help to build a scalable and robust mobile agent system. Our main target in this work is to develop a new proactive approach, more sophisticated and based on the risk analysis to provide a secure access for mobile agent systems. For this aim, we will start from analyzing the existing access control methods for mobile agent and then examine a pr-existed proactive model to develop a new one able to characterize the risk through more significant aspects such as its impact (integrity, confidentiality, Privacy ...).
Keywords :
Internet; authorisation; computer network security; mobile agents; risk analysis; IT experts; Internet; access control approach; agent technologies; computer networks; distributed systems; highly available secure networking; mitigation complex distributed problems; proactive mobile agent security; reactive security methods; risk analysis; Access control; Analytical models; Java; Mobile agents; Organizations; Risk analysis; impact aspect; mobile agents; proactive approach; reactive security; risk;
Conference_Titel :
Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on
Conference_Location :
Klaipeda City
Print_ISBN :
978-1-4673-1106-9
DOI :
10.1109/ICDIPC.2012.6257284