Title :
The role of Trusted Computing in secure agent migration
Author :
Antonio Munoz;Antonio Mana;Daniel Serrano
Author_Institution :
GISUM group at the University of Malaga, Spain
Abstract :
Software agents are a promising computing paradigm. Scientific community has devoted important efforts to this field [1]. Indeed, several important applications exist based on this technology. Despite of their benefits, the lack of the appropriate security mechanisms for agent based systems represents a barrier for the widespread use of this technology. Additionally, the application of the current security techniques is not trivial for agent based system developers, which are usually not security experts. This paper presents a hardware based protection infrastructure that takes advantage of the recent advances in trusted hardware in order to solve the problem known as the malicious host in mobile agent systems. This infrastructure is composed of extensions to the JADE framework and the Trusted Computing technology. Additionally, the protocol used in this implementation has been validated using the Automated Validation of Internet Security Protocols and Applications (AVISPA) as we described in the paper.
Keywords :
"Security","Hardware","Protocols","Software agents","Application software","Appropriate technology","Protection","Mobile agents","Computers","Internet"
Conference_Titel :
Research Challenges in Information Science, 2009. RCIS 2009. Third International Conference on
Print_ISBN :
978-1-4244-2864-9
Electronic_ISBN :
2151-1357
DOI :
10.1109/RCIS.2009.5089289