Security and trust management in mobile agents: a new perspective

Lin Ching*, V. Varadharajan, Wang Yan, V. Pruthi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)

Abstract

This paper presents a new perspective for mobile agent security - trust enhanced security and develops MobileTrust - a novel trust management architecture to support the trust enhanced security solutions for mobile agents. Based on this new perspective we go beyond traditional security mechanism based architectural design by incorporating a trust model into the underlying security architecture. Such an approach enables explicit management of security related trust relationships and it integrates trust into security decision making process to achieve trust enhanced security, which is impossible with the traditional security models. The proposed architecture provides several desirable emergent properties: increased level of security for mobile agent and host, improved flexibility, and scalability of the underlying security system, which are only made possible by this new trust management based approach.

Original languageEnglish
Title of host publicationProceedings of the Second International Conference on Mobile Technology, Application and Systems
EditorsPeter H. J. Chong, Wei Gang
Place of PublicationSingapore
PublisherIntegrated Meetings Specialist
Pages1-9
Number of pages9
ISBN (Print)9810545711, 9789810545710
DOIs
Publication statusPublished - 2005
EventIEE Mobility Conference 2005 - The Second International Conference on Mobile Technology, Applications and Systems - Guangzhou, China
Duration: 15 Nov 200517 Nov 2005

Other

OtherIEE Mobility Conference 2005 - The Second International Conference on Mobile Technology, Applications and Systems
Country/TerritoryChina
CityGuangzhou
Period15/11/0517/11/05

Fingerprint

Dive into the research topics of 'Security and trust management in mobile agents: a new perspective'. Together they form a unique fingerprint.

Cite this