SudiptaRakshit - Access Control For Mobile Agents Sudipta...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Access Control For Mobile Agents Sudipta Rakshit University of Central Florida, Spring 2002
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Concepts Mobile Agent (MA): - Autonomous, executable program that can migrate on its own. Access Control: - Authentication of a request to use a resource and Authorization of the request
Background image of page 2
How it works The mobile agent visits one or several machines and either performs some task by itself or asks some resident program to perform the task for it (MA).
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Problems Malicious hosts and/or code: - the host may change certain critical portion of the code and/or vice versa
Background image of page 4
Travel Agent Example Airline 2 Airline 1 Travel Agent Customer Request(1) Result(5) MA(3) MA(2) MA(4)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Objective Objective: - 1.To design and implement an access control policy for the simple 2-3 servers system above. 2. To provide an access control framework for a more distributed system
Background image of page 6
References “Authentication in Distributed Systems: Theory and Practice”, B. Lampson, M. Abadi, M. Burrows, and E. Wobber. ACM Trans. Computer Systems 10, 4 (Nov. 1992), pp265-310.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 07/30/2011 for the course COP 5600 taught by Professor Staff during the Summer '11 term at University of Central Florida.

Page1 / 8

SudiptaRakshit - Access Control For Mobile Agents Sudipta...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online