By Topic

Proactive mobile agent security:A new access control approach based on the risk analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Dhouib, H. ; Lab. MMA, Nat. Inst. of Appl. Sci. & Technol. (INSAT), Tunis, Tunisia ; Loukil, A. ; Ammari, A.C. ; Jemai, A.

The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. So, with today's complex, heterogeneous, and large networks, IT experts become more and more pressed to ensure high performing and highly available secure networking, notably with the emergence of the distributed systems and the rise of the users needs in this field where the birth of the agent technologies. Despite its numerous practical benefits and promises to provide an efficient way of mitigation complex distributed problems, mobile agent technologies still lacks an effective security measure which severely restricts its scope of applicability. As a consequence, management of the security of the mobile agent systems is a real challenge exceeding the capacity of the traditional reactive security methods mainly in case we are exposed to different risks and to newly created attacks. We do then need to adopt a proactive analysis approach that will continually check, evaluate and enhance the network capacity and help to build a scalable and robust mobile agent system. Our main target in this work is to develop a new proactive approach, more sophisticated and based on the risk analysis to provide a secure access for mobile agent systems. For this aim, we will start from analyzing the existing access control methods for mobile agent and then examine a pr-existed proactive model to develop a new one able to characterize the risk through more significant aspects such as its impact (integrity, confidentiality, Privacy ...).

Published in:

Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on

Date of Conference:

10-12 July 2012