About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Workshop on Trusted Collaboration

Research Article

Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COLCOM.2006.361905,
        author={Ching Lin and Vijay Varadharajan},
        title={Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents},
        proceedings={1st International ICST Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2007},
        month={5},
        keywords={Authorization Collaboration Computer architecture Computer industry Distributed computing IP networks Mobile agents Resumes Security Uncertainty},
        doi={10.1109/COLCOM.2006.361905}
    }
    
  • Ching Lin
    Vijay Varadharajan
    Year: 2007
    Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents
    TRUSTCOL
    IEEE
    DOI: 10.1109/COLCOM.2006.361905
Ching Lin1,*, Vijay Varadharajan1,*
  • 1: Department of Computing Macquarie University, North Ryde, NSW 2109, Australia
*Contact email: linc@ics.mq.edu.au, vijay@ics.mq.edu.au

Abstract

The mobile agent computing model violates some of the fundamental assumptions of conventional security techniques. Consequently, this has rendered many of the existing conventional security countermeasures less effective for mobile agents. In this paper, we propose a new philosophy of trust enhanced security, which advocates a paradigm shift for mobile agent security solutions: from security-centric to trust-centric with the aim of providing improved security and performance of mobile agents. We first examine the problem of uncertainty in behavior induced by the security assumption violations by mobile agents; we then propose a trust enhanced security approach and argue for the need for a paradigm shift to trust-centric solutions. Next we identify a list of general design requirements for the trust-centric solutions and outline the new architectural design which supports the new trust enhanced security philosophy in practice. Finally we discuss the emergent properties of the new architecture and introduce the experimental results for validating the properties.

Keywords
Authorization Collaboration Computer architecture Computer industry Distributed computing IP networks Mobile agents Resumes Security Uncertainty
Published
2007-05-21
Publisher
IEEE
http://dx.doi.org/10.1109/COLCOM.2006.361905
Copyright © 2006–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL