Security of Mobile Agent Platforms Using Access Control and Cryptography View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2015

AUTHORS

Hind Idrissi , El Mamoun Souidi , Arnaud Revel

ABSTRACT

Mobile Agents are autonomous software entities able to move from one host to another. However, this mobility is not all the time safe, as a hosting platform may receive agents with malicious behaviors. In this paper, we attempt to deal with this security problem by proposing a solution based on a strengthened cryptographic authentication and an access control policy. The proposed authentication process is performed through a resistant MITM Diffie-Hellman key exchange protocol, while the resources access control policy is elaborated basing an enhanced DAC model where Shamir-Threshold Scheme is used to manage and share access rights. We have conducted detailed experiments and practical investigations to evaluate the security of our approach and its effectiveness to resist face to some well known attacks. More... »

PAGES

27-39

References to SciGraph publications

  • 2010. An Extended Proof-Carrying Code Framework for Security Enforcement in TRANSACTIONS ON COMPUTATIONAL SCIENCE XI
  • 2012-03. A survey of security issue in multi-agent systems in ARTIFICIAL INTELLIGENCE REVIEW
  • Book

    TITLE

    Agent and Multi-Agent Systems: Technologies and Applications

    ISBN

    978-3-319-19727-2
    978-3-319-19728-9

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-19728-9_3

    DOI

    http://dx.doi.org/10.1007/978-3-319-19728-9_3

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1036147178


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "University of La Rochelle", 
              "id": "https://www.grid.ac/institutes/grid.11698.37", 
              "name": [
                "LabMIA, Faculty of Sciences, University of Mohammed-V", 
                "L3I, University of La Rochelle"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Idrissi", 
            "givenName": "Hind", 
            "id": "sg:person.012627314745.31", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012627314745.31"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Mohammed V University", 
              "id": "https://www.grid.ac/institutes/grid.31143.34", 
              "name": [
                "LabMIA, Faculty of Sciences, University of Mohammed-V"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Souidi", 
            "givenName": "El Mamoun", 
            "id": "sg:person.011103723115.99", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011103723115.99"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of La Rochelle", 
              "id": "https://www.grid.ac/institutes/grid.11698.37", 
              "name": [
                "L3I, University of La Rochelle"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Revel", 
            "givenName": "Arnaud", 
            "id": "sg:person.010634335021.86", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010634335021.86"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/s10462-011-9228-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011380812", 
              "https://doi.org/10.1007/s10462-011-9228-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1080/17445760500356205", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030779841"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17697-5_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045546687", 
              "https://doi.org/10.1007/978-3-642-17697-5_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17697-5_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045546687", 
              "https://doi.org/10.1007/978-3-642-17697-5_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1049/ecej:20020504", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1056748841"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/lcomm.2005.1437374", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061347087"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.15373/2249555x/sept2013/87", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1067761998"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.4304/jcm.3.2.1-12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1072445560"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.7763/ijcee.2013.v5.742", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1074032332"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2015", 
        "datePublishedReg": "2015-01-01", 
        "description": "Mobile Agents are autonomous software entities able to move from one host to another. However, this mobility is not all the time safe, as a hosting platform may receive agents with malicious behaviors. In this paper, we attempt to deal with this security problem by proposing a solution based on a strengthened cryptographic authentication and an access control policy. The proposed authentication process is performed through a resistant MITM Diffie-Hellman key exchange protocol, while the resources access control policy is elaborated basing an enhanced DAC model where Shamir-Threshold Scheme is used to manage and share access rights. We have conducted detailed experiments and practical investigations to evaluate the security of our approach and its effectiveness to resist face to some well known attacks.", 
        "editor": [
          {
            "familyName": "Jezic", 
            "givenName": "Gordan", 
            "type": "Person"
          }, 
          {
            "familyName": "Howlett", 
            "givenName": "Robert J.", 
            "type": "Person"
          }, 
          {
            "familyName": "Jain", 
            "givenName": "Lakhmi C.", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-19728-9_3", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-19727-2", 
            "978-3-319-19728-9"
          ], 
          "name": "Agent and Multi-Agent Systems: Technologies and Applications", 
          "type": "Book"
        }, 
        "name": "Security of Mobile Agent Platforms Using Access Control and Cryptography", 
        "pagination": "27-39", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-19728-9_3"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "ac30d527aeb5c1b9541a77614d0c5673197fa1e6d0ffee7866dfb8b598d89546"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1036147178"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-19728-9_3", 
          "https://app.dimensions.ai/details/publication/pub.1036147178"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T00:50", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8700_00000265.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-19728-9_3"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-19728-9_3'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-19728-9_3'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-19728-9_3'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-19728-9_3'


     

    This table displays all metadata directly associated to this object as RDF triples.

    119 TRIPLES      23 PREDICATES      35 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-19728-9_3 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author Nd0781d07bee74e50ab15132591eb1795
    4 schema:citation sg:pub.10.1007/978-3-642-17697-5_13
    5 sg:pub.10.1007/s10462-011-9228-8
    6 https://doi.org/10.1049/ecej:20020504
    7 https://doi.org/10.1080/17445760500356205
    8 https://doi.org/10.1109/lcomm.2005.1437374
    9 https://doi.org/10.15373/2249555x/sept2013/87
    10 https://doi.org/10.4304/jcm.3.2.1-12
    11 https://doi.org/10.7763/ijcee.2013.v5.742
    12 schema:datePublished 2015
    13 schema:datePublishedReg 2015-01-01
    14 schema:description Mobile Agents are autonomous software entities able to move from one host to another. However, this mobility is not all the time safe, as a hosting platform may receive agents with malicious behaviors. In this paper, we attempt to deal with this security problem by proposing a solution based on a strengthened cryptographic authentication and an access control policy. The proposed authentication process is performed through a resistant MITM Diffie-Hellman key exchange protocol, while the resources access control policy is elaborated basing an enhanced DAC model where Shamir-Threshold Scheme is used to manage and share access rights. We have conducted detailed experiments and practical investigations to evaluate the security of our approach and its effectiveness to resist face to some well known attacks.
    15 schema:editor N6d79b591470e45eabeb583efedc71912
    16 schema:genre chapter
    17 schema:inLanguage en
    18 schema:isAccessibleForFree false
    19 schema:isPartOf N8b925cad12fd43938f64f050a392337c
    20 schema:name Security of Mobile Agent Platforms Using Access Control and Cryptography
    21 schema:pagination 27-39
    22 schema:productId N1b0fa0d22afa4b45be1679d5d1b9784d
    23 N8731d47a174644d89dc3727a5da25a85
    24 Nba027f4e5f634c7b9e7d85c628483b75
    25 schema:publisher N645afd3dcbce42d188327e4008909030
    26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036147178
    27 https://doi.org/10.1007/978-3-319-19728-9_3
    28 schema:sdDatePublished 2019-04-16T00:50
    29 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    30 schema:sdPublisher Nacf7444bdc7e4ddcbf72f840c1c2102b
    31 schema:url http://link.springer.com/10.1007/978-3-319-19728-9_3
    32 sgo:license sg:explorer/license/
    33 sgo:sdDataset chapters
    34 rdf:type schema:Chapter
    35 N01f14d72aa4542b99338529167d2471d schema:familyName Jezic
    36 schema:givenName Gordan
    37 rdf:type schema:Person
    38 N1b0fa0d22afa4b45be1679d5d1b9784d schema:name doi
    39 schema:value 10.1007/978-3-319-19728-9_3
    40 rdf:type schema:PropertyValue
    41 N6388c00bd1bd48669a3565c65d421f32 rdf:first sg:person.010634335021.86
    42 rdf:rest rdf:nil
    43 N645afd3dcbce42d188327e4008909030 schema:location Cham
    44 schema:name Springer International Publishing
    45 rdf:type schema:Organisation
    46 N6d79b591470e45eabeb583efedc71912 rdf:first N01f14d72aa4542b99338529167d2471d
    47 rdf:rest Nb63d0feafb2b4ad497a52e9bf36421b9
    48 N799b95f6e45a4cc2ad27cc71b00d4d1e schema:familyName Jain
    49 schema:givenName Lakhmi C.
    50 rdf:type schema:Person
    51 N7b3b8eef03284f12ae9fdbbea5f6199d rdf:first sg:person.011103723115.99
    52 rdf:rest N6388c00bd1bd48669a3565c65d421f32
    53 N8731d47a174644d89dc3727a5da25a85 schema:name readcube_id
    54 schema:value ac30d527aeb5c1b9541a77614d0c5673197fa1e6d0ffee7866dfb8b598d89546
    55 rdf:type schema:PropertyValue
    56 N8b925cad12fd43938f64f050a392337c schema:isbn 978-3-319-19727-2
    57 978-3-319-19728-9
    58 schema:name Agent and Multi-Agent Systems: Technologies and Applications
    59 rdf:type schema:Book
    60 N8d304d382b794239ae4660b56a409f3b schema:familyName Howlett
    61 schema:givenName Robert J.
    62 rdf:type schema:Person
    63 N967aba6afc64411dba8cb157a253a7d1 rdf:first N799b95f6e45a4cc2ad27cc71b00d4d1e
    64 rdf:rest rdf:nil
    65 Nacf7444bdc7e4ddcbf72f840c1c2102b schema:name Springer Nature - SN SciGraph project
    66 rdf:type schema:Organization
    67 Nb63d0feafb2b4ad497a52e9bf36421b9 rdf:first N8d304d382b794239ae4660b56a409f3b
    68 rdf:rest N967aba6afc64411dba8cb157a253a7d1
    69 Nba027f4e5f634c7b9e7d85c628483b75 schema:name dimensions_id
    70 schema:value pub.1036147178
    71 rdf:type schema:PropertyValue
    72 Nd0781d07bee74e50ab15132591eb1795 rdf:first sg:person.012627314745.31
    73 rdf:rest N7b3b8eef03284f12ae9fdbbea5f6199d
    74 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    75 schema:name Information and Computing Sciences
    76 rdf:type schema:DefinedTerm
    77 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    78 schema:name Computer Software
    79 rdf:type schema:DefinedTerm
    80 sg:person.010634335021.86 schema:affiliation https://www.grid.ac/institutes/grid.11698.37
    81 schema:familyName Revel
    82 schema:givenName Arnaud
    83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010634335021.86
    84 rdf:type schema:Person
    85 sg:person.011103723115.99 schema:affiliation https://www.grid.ac/institutes/grid.31143.34
    86 schema:familyName Souidi
    87 schema:givenName El Mamoun
    88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011103723115.99
    89 rdf:type schema:Person
    90 sg:person.012627314745.31 schema:affiliation https://www.grid.ac/institutes/grid.11698.37
    91 schema:familyName Idrissi
    92 schema:givenName Hind
    93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012627314745.31
    94 rdf:type schema:Person
    95 sg:pub.10.1007/978-3-642-17697-5_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045546687
    96 https://doi.org/10.1007/978-3-642-17697-5_13
    97 rdf:type schema:CreativeWork
    98 sg:pub.10.1007/s10462-011-9228-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011380812
    99 https://doi.org/10.1007/s10462-011-9228-8
    100 rdf:type schema:CreativeWork
    101 https://doi.org/10.1049/ecej:20020504 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056748841
    102 rdf:type schema:CreativeWork
    103 https://doi.org/10.1080/17445760500356205 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030779841
    104 rdf:type schema:CreativeWork
    105 https://doi.org/10.1109/lcomm.2005.1437374 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061347087
    106 rdf:type schema:CreativeWork
    107 https://doi.org/10.15373/2249555x/sept2013/87 schema:sameAs https://app.dimensions.ai/details/publication/pub.1067761998
    108 rdf:type schema:CreativeWork
    109 https://doi.org/10.4304/jcm.3.2.1-12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1072445560
    110 rdf:type schema:CreativeWork
    111 https://doi.org/10.7763/ijcee.2013.v5.742 schema:sameAs https://app.dimensions.ai/details/publication/pub.1074032332
    112 rdf:type schema:CreativeWork
    113 https://www.grid.ac/institutes/grid.11698.37 schema:alternateName University of La Rochelle
    114 schema:name L3I, University of La Rochelle
    115 LabMIA, Faculty of Sciences, University of Mohammed-V
    116 rdf:type schema:Organization
    117 https://www.grid.ac/institutes/grid.31143.34 schema:alternateName Mohammed V University
    118 schema:name LabMIA, Faculty of Sciences, University of Mohammed-V
    119 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...