CFP last date
20 May 2024
Reseach Article

Self-Adaptive Security for Mobiles Agents

by Razouki Hassan, Hair Abdellatif
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 13
Year of Publication: 2014
Authors: Razouki Hassan, Hair Abdellatif
10.5120/16404-6102

Razouki Hassan, Hair Abdellatif . Self-Adaptive Security for Mobiles Agents. International Journal of Computer Applications. 94, 13 ( May 2014), 24-29. DOI=10.5120/16404-6102

@article{ 10.5120/16404-6102,
author = { Razouki Hassan, Hair Abdellatif },
title = { Self-Adaptive Security for Mobiles Agents },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 13 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number13/16404-6102/ },
doi = { 10.5120/16404-6102 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:17:34.136469+05:30
%A Razouki Hassan
%A Hair Abdellatif
%T Self-Adaptive Security for Mobiles Agents
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 13
%P 24-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The mobile agents' technology has been shown efficient to diverse computer networks applications due to its autonomy and capacity of adaptation. However, it also brings significant security concerns. The protection of Mobile agents is one of the most difficult problems in the area of mobile agents' security. There is not a single, comprehensive solution that provides complete protection of agents against malicious hosts. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechanisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms.

References
  1. Alvaro, M. , and Sergi, R. 2007. Component-Based Development of Secure Mobile Agents Application, In Proceedings of Multi-Agent Systems and Applications V, 113-122.
  2. Samaras, G. 2004. Mobile agents: What about them? Did they deliver what they promised? Are they here to stay?. University of Cyprus, , 294-295.
  3. Karjoth, G. , Lange, D. B. , and Oshima, M. 2009. A Security Model for Aglets. In IEEE Internet Computing, Volume. 1, no. 4, (May 2009), 68-77.
  4. Zhidong, S. , and Xiaoping, W. 2008. A Trusted Computing Technology Enabled Mobile Agent System. In Proceedings of International Conference on Computer Science and Software Engineering, 567- 570.
  5. WANG, R. , HU T. , and XU X. 2004. Research in to mobile agent security. Jounal of Chongqing University of Posts and Telecommunications, Volume 16, Issue 3, 81-86.
  6. Lukasz N. , Marcin P. , and Michal R. 2006. Mobile agent security. 1 Thomas edition, Information assurance and computer security, l02-123.
  7. Bella vista, P. , Corradi, A. , Frederici, C. , Montanari, R. , and Tibaldi, D. 2004. Security for Mobile Agents: Issues and Challenges. Invited Chapter in the Book Handbook of Mobile Computing, I. Mahgoub, M. Ilyas(eds. ), CRC Press,.
  8. Zhang, X. , Parisi-Presicce, F. , and Sandhu, R. 2006. Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing, International Workshop on Security (IWSEC).
  9. Ibharalu F. T. , Sofoluwe A. B. , and Akinwale A. T. 2011. A reliable protection architecture for mobile agents in open network system. International journal of computer applications, Volume 17, Issue 7, 6-14.
  10. Nisha, P. , Sunil, K. , and Ashu B. 2010. Security on mobile agent based crawler. International journal of computer applications, Volume I, Issue IS, 5-11.
  11. Shibli, A. , Yousaf, I. , and Muftic, S. 2010. MagicNET : Security system for protection of mobile agents. In Proceedings of IEEE International Conference on Advanced Information Networking and Applications, 1233-1240.
  12. Shibli, M. A. , Muftic, S. , Giambruno, A. , and Lioy, A. 2009. MagicNET: Security system for development, validation and adoption of mobile agents. In Proceedings of 3,d International Conference on Network and system security, 389-396.
  13. Leriche, S. , and Arcangeli, J. 2010. Flexible architectures of adaptive agents: the agent approach. International journal of grid computing and multi agent systems (IJGCMAS), Volume. 1, no. 1, 55-75.
  14. Bellwood, T. , et al. 2002. UDDI Version 3. 0, UDDI Spec Technical Committee Specification (19 July 2002), web: http://uddi. org/pubs/uddi-v3. 00-published-20020719. htm.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile agent Security Cryptography Software components Static adaptation Dynamic adaptation