A security architecture for agent-based mobile systems
A security architecture for agent-based mobile systems
- Author(s):
- DOI: 10.1049/cp:20020411
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Third International Conference on 3G Mobile Communication Technologies — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): Source: Third International Conference on 3G Mobile Communication Technologies, 2002 p. 312 – 318
- Conference: Third International Conference on 3G Mobile Communication Technologies
- DOI: 10.1049/cp:20020411
- ISBN: 0 85296 749 7
- Location: London, UK
- Conference date: 8-10 May 2002
- Format: PDF
Future mobile systems are expected to exploit the flexibility of agent-based software in a variety of ways. This includes agents providing both middleware and application-level functionality. Realising the full benefits of this innovative approach requires that security issues are properly addressed. There are many security issues associated with agent-based systems; some of the most difficult to deal with arise when agents themselves can be mobile. There has been much recent interest in developing cryptographic protocols designed especially for securing mobile agents. However, this work has mainly been ad hoc in nature, i.e., it has not been developed in response to a thorough analysis of the security requirements for a particular agent application. The paper describes research intended to help rectify this gap by providing a detailed security architecture, including a security model and a specification of security services provided within the model.
Inspec keywords: cryptography; telecommunication security; middleware; mobile radio; mobile agents; telecommunication computing
Subjects: Mobile radio systems; Cryptography; Data security; Security aspects; Communications computing
Related content
content/conferences/10.1049/cp_20020411
pub_keyword,iet_inspecKeyword,pub_concept
6
6