80 likes | 207 Views
This paper by Sudipta Rakshit from the University of Central Florida discusses mobile agents (MAs) as autonomous programs that can migrate across various machines. It focuses on access control, covering the essential aspects of authentication and authorization within a distributed system. The goal is to design and implement an access control policy for a simplistic two-server system while also addressing the challenges posed by malicious hosts and code alterations. The paper draws on prominent works in the field to provide a comprehensive framework for ensuring security in mobile agent applications.
E N D
Access Control For Mobile Agents Sudipta Rakshit University of Central Florida, Spring 2002
Concepts • Mobile Agent (MA): - Autonomous, executable program that can migrate on its own. • Access Control: - Authentication of a request to use a resource and Authorization of the request
How it works • The mobile agent visits one or several machines and either performs some task by itself or asks some resident program to perform the task for it (MA).
Problems • Malicious hosts and/or code: - the host may change certain critical portion of the code and/or vice versa
Travel Agent Example Airline 2 Airline 1 MA(3) MA(4) MA(2) Travel Agent Customer Request(1) Result(5)
Objective • Objective: - 1.To design and implement an access control policy for the simple 2-3 servers system above. 2. To provide an access control framework for a more distributed system
References • “Authentication in Distributed Systems: Theory and Practice”, B. Lampson, M. Abadi, M. Burrows, and E. Wobber. ACM Trans. Computer Systems 10, 4 (Nov. 1992), pp265-310. http://delivery.acm.org/10.1145/140000/138874/p265-lampson.pdf?key1=138874&key2=1669592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN=87451905 • “Authentication for Mobile Agents”, Shimshon Berkovits, Joshua D. Guttman, and Vipin Swarup. LNCS 1419, pp 114-136 http://link.springer.de/link/service/series/0558/papers/1419/14190114.pdf • “Linda in Context”, Nicholas Carriero and David Gelernter. Communications of the ACM April 1989, Volume 32 Issue 4, pp 444-458 http://portal.acm.org/citation.cfm?id=63337&coll=portal&dl=ACM&CFID=1506807&CFTOKEN=43124044 • “Making Tuple Spaces Safe for Heterogeneous Distributed Systems”, N. H. Minsky, Y. M. Minsky and V. Ungureanu, ACM SAC 2000: Special Track on Coordination Models, Languages and Applications, Como, Italy, 19-21 April, 2000, pp. 218-226. http://delivery.acm.org/10.1145/340000/335748/p218-minsky.pdf?key1=335748&key2=5819592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN=87451905
Pointers to References • 1. "Authentication for Mobile Agents" by Shimshon Berkovits, Joshua Guttman and Vipin Swarum • LNCS vol 1419 pp 114-136 • http://link.springer.de/link/service/series/0558/papers/1419/14190114.pdf • 2. "Making Tuple Spaces Safe for Heterogeneous Distributed Systems" • Naftaly Minsky, Yaron Minsky and Victoria Ungureanu • http://delivery.acm.org/10.1145/340000/335748/p218-minsky.pdf?key1=335748&key2=5819592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN=87451905 • 3."Linda in Context" by Nicholas Carriero and David Gelernter....I am not providing the pointer to this paper as this one basically deals with how Linda works. • 4. "Authentication in Distributed Systems" Lampson, Abdi, Burrows and Wobber. • http://delivery.acm.org/10.1145/140000/138874/p265-lampson.pdf?key1=138874&key2=1669592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN=87451905