Download presentation
Presentation is loading. Please wait.
Published bySolomon Mathews Modified over 8 years ago
1
Access Control For Mobile Agents Sudipta Rakshit University of Central Florida, Spring 2002
2
Concepts Mobile Agent (MA): - Autonomous, executable program that can migrate on its own. Access Control: - Authentication of a request to use a resource and Authorization of the request
3
How it works The mobile agent visits one or several machines and either performs some task by itself or asks some resident program to perform the task for it (MA).
4
Problems Malicious hosts and/or code: - the host may change certain critical portion of the code and/or vice versa
5
Travel Agent Example Airline 2Airline 1 Travel Agent Customer Request(1) Result(5) MA(3) MA(2) MA(4)
6
Objective Objective: - 1.To design and implement an access control policy for the simple 2-3 servers system above. 2. To provide an access control framework for a more distributed system
7
References “Authentication in Distributed Systems: Theory and Practice”, B. Lampson, M. Abadi, M. Burrows, and E. Wobber. ACM Trans. Computer Systems 10, 4 (Nov. 1992), pp265-310. http://delivery.acm.org/10.1145/140000/138874/p265- lampson.pdf?key1=138874&key2=1669592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN =87451905 “Authentication for Mobile Agents”, Shimshon Berkovits, Joshua D. Guttman, and Vipin Swarup. LNCS 1419, pp 114-136 http://link.springer.de/link/service/series/0558/papers/1419/14190114.pdf “Linda in Context”, Nicholas Carriero and David Gelernter. Communications of the ACM April 1989, Volume 32 Issue 4, pp 444-458 http://portal.acm.org/citation.cfm?id=63337&coll=portal&dl=ACM&CFID=1506807&CFTOKEN=43 124044 “Making Tuple Spaces Safe for Heterogeneous Distributed Systems”, N. H. Minsky, Y. M. Minsky and V. Ungureanu, ACM SAC 2000: Special Track on Coordination Models, Languages and Applications, Como, Italy, 19-21 April, 2000, pp. 218-226. http://delivery.acm.org/10.1145/340000/335748/p218- minsky.pdf?key1=335748&key2=5819592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN= 87451905http://delivery.acm.org/10.1145/340000/335748/p218- minsky.pdf?key1=335748&key2=5819592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN= 87451905
8
Pointers to References 1. "Authentication for Mobile Agents" by Shimshon Berkovits, Joshua Guttman and Vipin Swarum LNCS vol 1419 pp 114-136 http://link.springer.de/link/service/series/0558/papers/1419/14190114.pdf 2. "Making Tuple Spaces Safe for Heterogeneous Distributed Systems" Naftaly Minsky, Yaron Minsky and Victoria Ungureanu http://delivery.acm.org/10.1145/340000/335748/p218- minsky.pdf?key1=335748&key2=5819592101&coll=portal&dl=ACM&CFID=1545331& CFTOKEN=87451905 http://delivery.acm.org/10.1145/340000/335748/p218- minsky.pdf?key1=335748&key2=5819592101&coll=portal&dl=ACM&CFID=1545331& CFTOKEN=87451905 3."Linda in Context" by Nicholas Carriero and David Gelernter....I am not providing the pointer to this paper as this one basically deals with how Linda works. 4. "Authentication in Distributed Systems" Lampson, Abdi, Burrows and Wobber. http://delivery.acm.org/10.1145/140000/138874/p265- lampson.pdf?key1=138874&key2=1669592101&coll=portal&dl=ACM&CFID=1545331 &CFTOKEN=87451905http://delivery.acm.org/10.1145/140000/138874/p265- lampson.pdf?key1=138874&key2=1669592101&coll=portal&dl=ACM&CFID=1545331 &CFTOKEN=87451905
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.