07Sp_SECB408_01&51_P8 - Mobile Agent Security...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Mobile Agent Security Requirements Based on NIST Special Publication 800-19 – Mobile Agent Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Requirements The users of agent and mobile agent frameworks have the following security requirements: confidentiality Integrity Accountability Availability
Background image of page 2
Security Requirements Confidentiality Any private data stored on a platform or carried by an agent must remain confidential. Agent frameworks must be able to ensure that their intra- and inter-platform communications remain confidential. Eavesdroppers can gather information about an agent's activities not only from the content of the messages exchanged, but also from the message flow from one agent to another agent or agents, ex. A burst of messages from one agent to another
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Requirements Confidentiality Mobile agents may also want to keep their location confidential. agents may communicate through a publicly known proxy Agents must be allowed to decide if their presence will be publicly available through platform directories, and platforms may enforce different security policies on agents that chose to be anonymous. An agent shopping for goods and services may wish to do so in privacy, but when a financial transaction is to be carried out the platform may require some form of authentication. In addition, an agent may not want to disclose which platforms it has visited on its itinerary, but the platform security policy of its host may not be willing to accept agents that have been on certain platforms outside the authority of certain approved security domains.
Background image of page 4
Security Requirements Confidentiality The contents of the audit log must also be carefully
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 15

07Sp_SECB408_01&51_P8 - Mobile Agent Security...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online