DocumentCode
2011889
Title
POM-a mobile agent security model against malicious hosts
Author
Guan, Xudong ; Yang, Yiling ; You, Jinyuan
Author_Institution
Dept. of Comput. Sci. & Eng., Shanghai Jiaotong Univ., China
Volume
2
fYear
2000
fDate
14-17 May 2000
Firstpage
1165
Abstract
Security, especially attacks performed by hosts on visiting mobile agents (the malicious hosts problem), is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agents, the host has full control over them and could easily perform many kinds of attacks against them. This problem has not been fully solved yet. After the analysis of mobile agent security requirements, this paper first gives some design issues of a practical security model of the malicious hosts problem. Based on this, POM (Police Office Model), a mobile agent security model, is presented. By setting up special hosts called police offices within regions, POM can prevent most attacks performed by malicious hosts through the separation of the safety-critical parts of mobile agents from the malicious hosts.
Keywords
mobile computing; security of data; software agents; POM; Police Office Model; malicious hosts problem; mobile agent security model; safety-critical parts;
fLanguage
English
Publisher
ieee
Conference_Titel
High Performance Computing in the Asia-Pacific Region, 2000. Proceedings. The Fourth International Conference/Exhibition on
Conference_Location
Beijing, China
Print_ISBN
0-7695-0589-2
Type
conf
DOI
10.1109/HPC.2000.843621
Filename
843621
Link To Document