An approach to mobile agent security in Java
Loading...
Authors
Virden, Roy John
Subjects
Mobile agent
Security
Java
Authentication protocol
Security
Java
Authentication protocol
Advisors
Volpano, Dennis M.
Date of Issue
1998-03-01
Date
March 1998
Publisher
Monterey, California. Naval Postgraduate School
Language
en_US
Abstract
For many years, people have talked about the advantages of programs that can roam networks and provide services for a client. The programs, called agents, have many military applications as well. Among them, for instance, is data mining, where an agent is dispatched to find information for a client. There are security risks associated with agents. For instance, in the data mining example, a client must be able to trust the information returned. If a trusted node in a network can be spoofed, then an untrusted node can easily corrupt the results of the mining operation. This thesis presents a protocol to guard against this sort of attack. The protocol assumes that every trusted host knows all other trusted hosts. Though unrealistic for some commercial applications, it seems like a reasonable assumption for military applications.
Type
Thesis
Description
Series/Report No
Department
Department of Computer Science
Organization
Naval Postgraduate School
Identifiers
NPS Report Number
Sponsors
Funder
Format
ix, 88 p.
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.