Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.1.031

Reliable Cascaded Delegation Scheme for Mobile Agent Environments  

Lee, Hyun-Suk (성균관대학교 대학원 정보통신공학부)
Eom, Young-Ik (성균관대학교 정보통신공학부)
Abstract
In mobile agent environments, migration of an agent occurs continuously due to the mobility of agents. So cascaded delegation can occur among places for delegating the privilege to execute the agent. Because the existing delegation scheme considers only the delegation between two places that participate in migration of an agent, it does not support secure cascaded delegation. In this paper, we propose a cascaded delegation scheme that provides agents with secure cascaded delegation in mobile agent environments. Depending on the trust-relationship among places, the proposed scheme achieves the goal by nesting each delegation token or by nesting only initial token signed by creator of the agent within the signed part of the next immediate delegation token. And we prove that the proposed scheme is secure against the attack of replaying a message and the attack of substituting a delegation token.
Keywords
Distributed Computing; Mobile Agent System; Security; Cascaded Delegation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 U. Wilhelm, S. Stamann and L. Buttyan, 'A pessimistic approach to trust in mobile agent platforms,' IEEE Internet Computing, Vol.4, No.5, pp.40-48, 2000   DOI   ScienceOn
2 C. Harrison, D. Chess and A. Kershenbaum, 'Mobile Agents : Are they a good idea?,' Research Report 1987, IBM Research Division, 1994
3 W. Jansen, 'Countermeasures for mobile agent security,' Computer Communications : Special Issue on Advances in Research and Application of Network Security, 2000   DOI   ScienceOn
4 Y. Ding and H. Petersen, 'A new approach for delegation using hierarchical delegation tokens,' Proc. 2nd Conference on Computer and Communications Security, pp.128-143, 1996
5 S. Berkovits, J. Guttman and V. Swamp, 'Authentication for mobile agents,' Lecture Notes in Computer Science #1419 : Mobile Agents and Security, Springer-Verlag, pp. 114-136, 1998
6 W. Farmer, J. Guttman and V. Swarup, 'Security for mobile agents : issues and requirements, Computer Communications : Special Issue on Advances in Research and Application of Network Security, 1996
7 A. Corradi, R. Montanari and C. Stefanelli, 'Mobile agents protection in the internet environment,' Proc. 23th Annual International Computer Software and Applications Conference, pp.80-85, 1999   DOI
8 B. Lampson, M. Abadi, M. Burrows and E. Wobber, 'Authentication in distributed systems : theory and practice,' Proc. 13th ACM Symposium on Operating Systems Principles, pp.165-182, 1991
9 G. Vogt, 'Delegation of tasks and rights,' Proc. 12th Annual IFIP/IEEE International Workshop on Distributed systems : Operations & Management, pp.327-337, 2001
10 M. Abadi, M. Burrows, B. Lampson and G. Plotkin, 'A calculus for access control in distributed systems,' ACM Transactions on Programming Language and Systems, Vol.15, No.4, pp.706-734, 1993   DOI   ScienceOn