access control for mobile agents

8
Access Control For Mobile Agents Sudipta Rakshit University of Central Florida, Spring 2002

Upload: lorne

Post on 04-Jan-2016

31 views

Category:

Documents


0 download

DESCRIPTION

Access Control For Mobile Agents. Sudipta Rakshit University of Central Florida, Spring 2002. Concepts. Mobile Agent (MA): - Autonomous, executable program that can migrate on its own. Access Control: - Authentication of a request to use a resource and Authorization of the request. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Access Control For Mobile Agents

Access Control For Mobile Agents

Sudipta Rakshit

University of Central Florida, Spring 2002

Page 2: Access Control For Mobile Agents

Concepts

• Mobile Agent (MA): - Autonomous, executable program that can migrate on its own.

• Access Control: - Authentication of a request to use a resource and Authorization of the request

Page 3: Access Control For Mobile Agents

How it works

• The mobile agent visits one or several machines and either performs some task by itself or asks some resident program to perform the task for it (MA).

Page 4: Access Control For Mobile Agents

Problems

• Malicious hosts and/or code: - the host may change certain critical portion of the code and/or vice versa

Page 5: Access Control For Mobile Agents

Travel Agent Example

Airline 2 Airline 1

Travel AgentCustomer

Request(1)

Result(5)

MA(3)

MA(2)MA(4)

Page 6: Access Control For Mobile Agents

Objective

• Objective: -

1.To design and implement an access control policy for the simple 2-3 servers system above.

2. To provide an access control framework for a more distributed system

Page 7: Access Control For Mobile Agents

References• “Authentication in Distributed Systems: Theory and Practice”, B. Lampson, M. Abadi, M. Burrows,

and E. Wobber. ACM Trans. Computer Systems 10, 4 (Nov. 1992), pp265-310.http://delivery.acm.org/10.1145/140000/138874/p265-lampson.pdf?key1=138874&key2=1669592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN=87451905

• “Authentication for Mobile Agents”, Shimshon Berkovits, Joshua D. Guttman, and Vipin Swarup. LNCS 1419, pp 114-136

http://link.springer.de/link/service/series/0558/papers/1419/14190114.pdf • “Linda in Context”, Nicholas Carriero and David Gelernter. Communications of the ACM April

1989, Volume 32 Issue 4, pp 444-458http://portal.acm.org/citation.cfm?id=63337&coll=portal&dl=ACM&CFID=1506807&CFTOKEN=43124044

• “Making Tuple Spaces Safe for Heterogeneous Distributed Systems”, N. H. Minsky, Y. M. Minsky and V. Ungureanu, ACM SAC 2000: Special Track on Coordination Models, Languages and Applications, Como, Italy, 19-21 April, 2000, pp. 218-226.

http://delivery.acm.org/10.1145/340000/335748/p218-minsky.pdf?key1=335748&key2=5819592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN=87451905

Page 8: Access Control For Mobile Agents

Pointers to References• 1. "Authentication for Mobile Agents" by Shimshon Berkovits, Joshua Guttman and

Vipin Swarum• LNCS vol 1419 pp 114-136• http://link.springer.de/link/service/series/0558/papers/1419/14190114.pdf •  • 2. "Making Tuple Spaces Safe for Heterogeneous Distributed Systems"• Naftaly Minsky, Yaron Minsky and Victoria Ungureanu• http://delivery.acm.org/10.1145/340000/335748/p218-minsky.pdf?

key1=335748&key2=5819592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN=87451905 

•  • 3."Linda in Context" by Nicholas Carriero and David Gelernter....I am not providing

the pointer to this paper as this one basically deals with how Linda works.•  • 4. "Authentication in Distributed Systems" Lampson, Abdi, Burrows and Wobber.• http://delivery.acm.org/10.1145/140000/138874/p265-lampson.pdf?

key1=138874&key2=1669592101&coll=portal&dl=ACM&CFID=1545331&CFTOKEN=87451905