Protected resource access for mobile agent-based distributed computing

Anand R Tripathi, N. Karnik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

This paper describes the mobile agent paradigm for distributed computing, and outlines the security-related issues encountered in supporting it. One of the major requirements is the provision of access control mechanisms for server resources. Several possible designs are discussed, and one such proxy-based design, which we have developed in conjunction with the Ajanta mobile agent system, is described in detail. Extensions of this mechanism which allow accounting of usage and selective revocation of access privileges are discussed. The Java security model is also described, since the security of the proxy mechanism depends on it.

Original languageEnglish (US)
Title of host publicationroceedings of the 1998 ICPP Workshop on Architectural and OS Support for Multimedia Applications Flexible Communication Systems. Wireless Networks and Mobile Computing, ICPPW 1998
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages144-153
Number of pages10
ISBN (Electronic)0818686588, 9780818686580
DOIs
StatePublished - 1998
Event1998 ICPP Workshop on Architectural and OS Support for Multimedia Applications Flexible Communication Systems. Wireless Networks and Mobile Computing, ICPPW 1998 - Minneapolis, United States
Duration: Aug 14 1998 → …

Publication series

NameProceedings of the 1998 ICPP Workshop on Architectural and OS Support for Multimedia Applications Flexible Communication Systems. Wireless Networks and Mobile Computing, ICPPW 1998
Volume1998-August

Other

Other1998 ICPP Workshop on Architectural and OS Support for Multimedia Applications Flexible Communication Systems. Wireless Networks and Mobile Computing, ICPPW 1998
Country/TerritoryUnited States
CityMinneapolis
Period8/14/98 → …

Fingerprint

Dive into the research topics of 'Protected resource access for mobile agent-based distributed computing'. Together they form a unique fingerprint.

Cite this