Presentation is loading. Please wait.

Presentation is loading. Please wait.

MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli.

Similar presentations


Presentation on theme: "MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli."— Presentation transcript:

1 MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli

2 Presentation Overview 1. Background 2. Mobile Agents 3. System Components 4. Roles in the Proposed System 5. Components of the System 6. Operations of the System 7. Conclusion

3 Mobile Agents Mobile agents are self-contained software modules with additional credentials and accumulated data. They roam a network, moving autonomously from one server to another, perform their designated tasks, and finally, eventually, return to their control station.

4 Background Wider Adoption of Mobile Agents Security Solutions –Platform –Agent

5 Still Problem !!!! –Experimental envirnoment –Close Envirnoment

6 Issues need to address Creation of mobile agents Specification of classification parameters. Validation procedures. Enforcement of roles and procedures Distribution of agents

7 System Components MagicNET stands for Mobile Agents Intelligent Community Network, has developed at secLab at DSV Department at KTH. MagicNET provide complete infrastructural and functional component for secure mobile agent research and development. It provide support to build secure & trusted mobile agents, provide agents repository (agents’ store), Mobile Agents Servers (for their runtime execution), Mobile Agent Control Station, Infrastructural servers.

8

9 Assurance Levels for Mobile Agents “Distributed trust management involves proving that an agent has the ability to access some service/resource solely by verifying that its credentials comply with the security policy of the requested service”[4]

10 Second Approach “... trust (or symmetrically, distrust) is a particular level of the subjective probability with which an agent will perform a particular action, both before it can monitor such action (or independently of his capacity to monitor it) and in a context in which it affects its own action”

11 Properties and Attributes Assurance Level LowMediumHigh Creator’s SignatureNoYes Sign Validation Yes Cert Validation Owner’s Signature NoYes Sign Validation Yes Cert Validation Appraiser’s SignatureNoYes Sign Validation Yes Cert Validation Privileged Authority’s Signature NoYes Sign Validation Yes Cert Validation Service Registrar’s Signature NoYes Sign Validation Yes Cert Validation Code EncryptionNoYes, symmetric key Triple DES 168 bits key Yes, symmetric key AES 256 bits key size RSA Key Size512 bits1024 bits2048 bits Baggage EncryptionNoYes, symmetric key shared with servers Yes, public key, enveloping XML based Task Specification NoYesYes, signed by Privileged Authority Role specificationNoYesYes, signed by Privileged Authority

12 Roles in the Proposed System Agent Creator (AC) Privilege Authority.(PA) Service Registrar. (SR) Agent Trust Appraiser(ATA) Agent Owner (AO)

13 Components of the System Global Certificate Management System Agent Factory Global Directory facilitator (UDDI Server) Management Server.

14 Operations of the System Agent Creation Agent Trust Appraiser Agent Privileges Assignment Agent Services Publishing Agent Adoption

15

16 Questions ???


Download ppt "MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli."

Similar presentations


Ads by Google