Browse > Article

A Nested Token-Based Delegation Scheme for Cascaded Delegation in Mobile Agent Environments  

Kwon, Hyeog-Man (성균관대학교 정보통신공학부 분산컴퓨팅)
Kim, Moon-Jeong (성균관대학교 정보통신공학부 분산컴퓨팅)
Eom, Young-Ik (성균관대학교 정보통신공학부 분산컴퓨팅)
Abstract
In mobile agent environments, cascaded delegations among places occur frequently due to the mobility of agents. Cascaded delegation in mobile agent environments can be defined as the process whereby the delegated place delegates the rights of the delegating place further. The representative study for delegation in mobile agent environments is Berkovits et al.'s study. Their study only defines the messages that is sent between the place executing the agent and the place where the agent migrates. Because their study considers only the delegation between two places which participate in migration of an agent, it is inadequate in the situation that the cascaded delegation is necessary. In other words, the relationships among the messages sent from and to places is necessary. However, their study does not exist the relationships. In this paper, we propose a delegation scheme that provides agents with secure cascaded delegation. The proposed scheme achieves the goal by nesting each delegation token within the signed part of the next immediate delegation token. We prove that the proposed scheme is secure against the attack of replaying a message and of substituting a delegation token.
Keywords
delegation; mobile agents; distributed systems; security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Conadi, R Montanah, C. Stefanelli, 'Mobile Agents Protection in the Internet Environment,' Proc. the 23th Annual International Computer Softwwe & Applications Conference, pp. 80-85, 1999
2 U. G. Wilhelm, S. M. Staamann, L. Buttyan. 'A Pessimistic Approach to Trust in Mobile Agent Platfoms,' IEEE Internet Computing, 4(5), pp. 40-48, 2000   DOI   ScienceOn
3 Y. Ding, H. Petersen, 'A New Approach for Delegation using Hierarchical Delegadon Token s,' Proc. the 2nd Conf. on Computer & Communications Secuity, pp. 128-143, 1996
4 B. Lampson, M. Abadi, M. Bunows, B Wobber, 'Authentication in Distiibuted Systems: Iheoiy and Practice,' Proc. the 13th ACM Symp. on Operating Systems Principles, pp.165-182, 1991
5 N. Li, B. Grosof, J. Feigenbaum. 'A Practically Implementable and Tractable Delegation Logic,' Proc. 2000 IEEE Sym. on Security & Privacy, pp. 27-42, 2000
6 W. A. Jansen, 'Countenneasures for Mobile Agent Secunty, Computer Communications,' 2000
7 B. C. Neuman, 'Ptoxy-Based Authonzadon and Accounting for Distributed Systems,' Proc. the 13th International Conference on Distributed Computing Systems, pp. 283-291, 1993
8 W. M. Farmer, J. D. Guttman, V. Swarup, 'Security for Mobile Agents: Issues and Requiiements,' Proc. the 19th National Information Systems Security Conference, pp. 591-597, 1996
9 B. Crispo, 'Delegation Protocols for Electronic Commerce,' Proc. the 6th IEEE Sym. on Computers & Coimmmications, pp. 674-679, 2001   DOI
10 C. G. Harrison, D. M. Chess, A. Kershenbaum, 'Mobile Agents: Are they a good idea?,' Research Report, IBM Research Division T. J. Watson Research Center, 1995
11 S. Berkovits, J. D. Guttman, V. Swarup, 'Authentication for Mobile Agents,' LNCS 1419, pp. 114-136, 1998
12 G. Vogt, 'Delegadon of Tasks and Rights,' Proc. the 12th Annual IFIP/1EEE International Workshop on Distributed Systems: Operations & Mamgement, pp. 327-337, 2001
13 V. Vardharajan, P. Allen, S. Black, 'An Analysis of the Proxy Problem in Distributed Systems,' Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 255-175, 1991
14 M. Abadi, M. Burrows, B. Lampson, G. Plotkin, 'A Calculus for Access Control in Disdibuted Systems,' ACM Transactions on Programming Language and Systems, 15(4), pp. 706.734, 1993   DOI   ScienceOn