Methodology of risk assessment in mobile agent system design

被引:5
|
作者
McLean, I [1 ]
Szymanski, B [1 ]
Bivens, A [1 ]
机构
[1] Rensselaer Polytech Inst, Troy, NY 12181 USA
关键词
D O I
10.1109/SMCSIA.2003.1232398
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current practices of software development use incomplete security models and result in implementations that leave security features either dangling in the midst of afterthoughts, or relegated to "future" upgrades or patches. Yet, security functions should be considered at the outset of any system design process. In Mobile Agent Systems, depending on their purpose, various paths may be taken to provide security based on the vulnerability of the features. Starting early to plan security and its implementation in such systems is particularly important because by design they operate in open environments with little central control. With widespread information sharing between potential system breakers ranging from amateur hackers to professional crackers, system security features are tested every day. As evident from frequent break-ins, security is often proven either inefficient or non-existent. Clearly, a pragmatic methodology of determining the system security requirements is needed. The purpose of this paper is two-folded. First, we catalog and classify numerous security techniques and practices for mobile agent systems. We also provide the definitions and describe implementations of security features relevant to mobile agent systems. Additionally, we measure their impact on agent system design and performance. The second purpose is to illustrate the discussed methodology in the context of DOORS, a mobile agent system developed by us for network performance data collection. We will discuss which security features are suitable for DOORS and how they impact the performance of the DOORS system.
引用
收藏
页码:35 / 42
页数:8
相关论文
共 50 条
  • [1] Security design of mobile agent system
    Wang, JH
    Hu, JP
    Hu, K
    11TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, PROCEEDINGS, 2000, : 426 - 430
  • [2] The Pregnancy Risk Assessment Monitoring System (PRAMS): Overview of Design and Methodology
    Shulman, Holly B.
    D'Angelo, Denise V.
    Harrison, Leslie
    Smith, Ruben A.
    Warner, Lee
    AMERICAN JOURNAL OF PUBLIC HEALTH, 2018, 108 (10) : 1305 - 1313
  • [3] Design and validation of the Medusa supply chain risk assessment methodology and system
    Papastergiou, Spyridon
    Polemi, Nineta
    Kotzanikolaou, Panayiotis
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2018, 14 (01) : 1 - 39
  • [4] Role of Multi Agent System Methodology in System Design
    Pandey, Anand Kumar
    Pandey, Rashmi
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 438 - 441
  • [5] Security Test Methodology for an Agent of a Mobile Device Management System
    Rhee, Keunwoo
    Kim, Hawon
    Na, Hac Yun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 137 - 142
  • [6] Design of the Ajanta system for mobile agent programming
    Tripathi, AR
    Karnik, NM
    Ahmed, T
    Singh, RD
    Prakash, A
    Kakani, V
    Vora, MK
    Pathak, M
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (02) : 123 - 140
  • [7] Risk assessment methodology for tunnel lining design
    Wang, Y.
    Huang, H. W.
    ROCK CHARACTERISATION, MODELLING AND ENGINEERING DESIGN METHODS, 2013, : 839 - 844
  • [8] Modern Methodology of the Safety Risk Assessment in Mobile Communication Networks
    Shomaksudov, B. Yu.
    Djurayev, R. H.
    2008 4TH IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2008, : 163 - 167
  • [9] Design of SPS model using mobile agent system
    Park, JH
    Chung, JW
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 38 - 42
  • [10] The design of telediagnosis system model based on mobile agent
    Tian, JF
    2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 1737 - 1741