Title :
Security concepts and implementation in the Ara mobile agent system
Author_Institution :
Kaiserslautern Univ., Germany
Abstract :
We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable systems. The Ara model features few principals, a simple authentication and encryption API, and a simple but highly customizable authorization scheme. One system may contain many virtual places, each establishing a domain of logically related services under a common security policy governing all agents at this place. Agents are equipped with allowances limiting their resource accesses, both globally per agent lifetime and locally per place. Various aspects of the implementation of this model are discussed, and finally the situation and limitations of Ara and other systems are summarized
Keywords :
application program interfaces; authorisation; cryptography; distributed processing; message authentication; object-oriented programming; software agents; API; Ara mobile agent system; application program interface; authentication; customizable authorization scheme; data encryption; resource access; security architecture; Appraisal; Authentication; Authorization; Code standards; Cryptography; Data privacy; Data security; Manufacturing; Mobile agents; Permission;
Conference_Titel :
Enabling Technologies: Infrastructure for Collaborative Enterprises, 1998. (WET ICE '98) Proceedings., Seventh IEEE International Workshops on
Conference_Location :
Stanford, CA
Print_ISBN :
0-8186-8751-7
DOI :
10.1109/ENABL.1998.725699