Abstract
In mobile agent environments, migration of an agent occurs continuously due to the mobility of the agent. So, cascaded delegation can occur among places for delegating the privilege to execute the agent. Because the existing delegation scheme considers only the delegation between two places that participate in migration of an agent, it does not support secure cascaded delegation. In this paper, we propose a cascaded delegation scheme that provides agents with secure cascaded delegation in mobile agent environments. Depending on the trust-relationship among places, the proposed scheme achieves the goal by nesting each delegation token or by nesting only initial token signed by sender of the agent within the signed part of the next immediate delegation token. We prove that the proposed scheme is secure against the attack of replaying a message and the attack of substituting a delegation token.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Harrison, C., Chess, D., Kershenbaum, A.: Mobile Agents: Are they a good idea? Research Report (1987), IBM Research Division (1994)
Berkovits, S., Guttman, J., Swarup, V.: Authentication for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 114–136. Springer, Heidelberg (1998)
Farmer, W., Guttman, J., Swarup, V.: Security for mobile agents: issues and requirements. Computer Communications: Special Issue on Advances in Research and Application of Network Security (1996)
Jansen, W.: Countermeasures for mobile agent security. Computer Communications: Special Issue on Advances in Research and Application of Network Security (2000)
Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents protection in the internet environment. In: Proc. 23th Annual International Computer Software and Applications Conference, pp. 80–85 (1999)
Wilhelm, U., Stamann, S., Buttyan, L.: A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing 4(5), 40–48 (2000)
Ding, Y., Petersen, H.: A new approach for delegation using hierarchical delegation tokens. In: Proc. 2nd Conference on Computer and Communications Security, pp. 128–143 (1996)
Vogt, G.: Delegation of tasks and rights. In: Proc. 12th Annual IFIP/IEEE International Workshop on Distributed systems: Operations & Management, pp. 327–337 (2001)
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Language and Systems 15(4), 706–734 (1993)
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. In: Proc. 13th ACM Symposium on Operating Systems Principles, pp. 165–182 (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, Hs., Kwon, H.M., Eom, Y.I. (2004). Reliable Cascaded Delegation Scheme for Mobile Agent Environments. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-24591-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20827-3
Online ISBN: 978-3-540-24591-9
eBook Packages: Springer Book Archive