Skip to main content
placeholder image

Policy-based authentication for mobile agents

Journal Article


Abstract


  • Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure a success of mobile agent applications. There exist several solutions for mobile agent security. Amongst these solutions, the proxy-based model is believed to be a sound solution to provide authentication, where the visiting host of an agent acts as a proxy signer who can sign an offer. However, any host (including a malicious host) could act as the signer. To solve this problem, a secure policy-based mobile agent scheme is proposed in this paper. That is, only the hosts who satisfy the designated policies can generate a valid signature. We also provide a security model and a rigorous security proof for our proposed scheme.

UOW Authors


  •   Wang, Yikai (external author)
  •   Mu, Yi (external author)
  •   Zhang, Minjie

Publication Date


  • 2011

Citation


  • Wang, Y., Mu, Y. & Zhang, M. (2011). Policy-based authentication for mobile agents. Lecture Notes in Computer Science, 6672 (N/A), 123-137. Guangzhou Policy-based authentication for mobile agents

Scopus Eid


  • 2-s2.0-79956322532

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1990

Number Of Pages


  • 14

Start Page


  • 123

End Page


  • 137

Volume


  • 6672

Abstract


  • Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure a success of mobile agent applications. There exist several solutions for mobile agent security. Amongst these solutions, the proxy-based model is believed to be a sound solution to provide authentication, where the visiting host of an agent acts as a proxy signer who can sign an offer. However, any host (including a malicious host) could act as the signer. To solve this problem, a secure policy-based mobile agent scheme is proposed in this paper. That is, only the hosts who satisfy the designated policies can generate a valid signature. We also provide a security model and a rigorous security proof for our proposed scheme.

UOW Authors


  •   Wang, Yikai (external author)
  •   Mu, Yi (external author)
  •   Zhang, Minjie

Publication Date


  • 2011

Citation


  • Wang, Y., Mu, Y. & Zhang, M. (2011). Policy-based authentication for mobile agents. Lecture Notes in Computer Science, 6672 (N/A), 123-137. Guangzhou Policy-based authentication for mobile agents

Scopus Eid


  • 2-s2.0-79956322532

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1990

Number Of Pages


  • 14

Start Page


  • 123

End Page


  • 137

Volume


  • 6672