Methodology of risk assessment in mobile agent system design

被引:5
|
作者
McLean, I [1 ]
Szymanski, B [1 ]
Bivens, A [1 ]
机构
[1] Rensselaer Polytech Inst, Troy, NY 12181 USA
来源
IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP | 2003年
关键词
D O I
10.1109/SMCSIA.2003.1232398
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current practices of software development use incomplete security models and result in implementations that leave security features either dangling in the midst of afterthoughts, or relegated to "future" upgrades or patches. Yet, security functions should be considered at the outset of any system design process. In Mobile Agent Systems, depending on their purpose, various paths may be taken to provide security based on the vulnerability of the features. Starting early to plan security and its implementation in such systems is particularly important because by design they operate in open environments with little central control. With widespread information sharing between potential system breakers ranging from amateur hackers to professional crackers, system security features are tested every day. As evident from frequent break-ins, security is often proven either inefficient or non-existent. Clearly, a pragmatic methodology of determining the system security requirements is needed. The purpose of this paper is two-folded. First, we catalog and classify numerous security techniques and practices for mobile agent systems. We also provide the definitions and describe implementations of security features relevant to mobile agent systems. Additionally, we measure their impact on agent system design and performance. The second purpose is to illustrate the discussed methodology in the context of DOORS, a mobile agent system developed by us for network performance data collection. We will discuss which security features are suitable for DOORS and how they impact the performance of the DOORS system.
引用
收藏
页码:35 / 42
页数:8
相关论文
共 50 条
  • [41] Design and implementation of an open sourced location service system for the aglets mobile agent system
    Li, Yi-Hsung
    Dow, Chyi-Ren
    Chang, Kuo-Hua
    Chen, Kuang-Ho
    2007 INTERNATIONAL CONFERENCE ON INTEGRATION OF KNOWLEDGE INTENSIVE MULTI-AGENT SYSTEMS, 2007, : 85 - +
  • [42] Design pattern based development methodology and support tool for multi agent system
    Youn, Hyunsang
    Lee, Eunseok
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2008, 4953 : 142 - 151
  • [43] Mobile Grid System Based on Mobile Agent
    Lee, JongHyuk
    Choi, SungJin
    Lim, JongBeom
    Suh, Taeweon
    Gil, JoonMin
    Yu, HeonChang
    GRID AND DISTRIBUTED COMPUTING, CONTROL AND AUTOMATION, 2010, 121 : 117 - +
  • [44] Development methodology for location-aware mobile agent
    Matsuzaki, K
    Yoshioka, N
    Honiden, S
    MOBILITY AWARE TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2004, 3284 : 13 - 26
  • [45] System Design of Risk Assessment in Power Market
    Li, Yongbo
    Cuil, Jinrui
    Zhao, Xueting
    Xie, Jingdong
    Zhang, Lei
    2022 IEEE/IAS INDUSTRIAL AND COMMERCIAL POWER SYSTEM ASIA (I&CPS ASIA 2022), 2022, : 400 - 405
  • [46] System Design for Disaster Risk Damage Assessment
    Maceda, Lany L.
    Llovido, Jennifer L.
    Serrano, Jocelyn E.
    2018 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2018), 2018, : 246 - 249
  • [47] An Empirical Approach to A System Design Methodology for Mobile Peer-to-Peer Computing
    Yu, Weider D.
    Patel, Jaykurnar
    Chitralamuthu, Muthukrishna
    Parakh, Siddharth S.
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 615 - 620
  • [48] Security in a mobile agent system
    van't Noordende, GJ
    Brazier, FMT
    Tanenbaum, AS
    2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 35 - 45
  • [49] A Heterogeneous Design Methodology for STT-RAM Memory System of Mobile SoC
    Lv, Minjie
    Sun, Hongbin
    Min, Tai
    Zhang, Tong
    Zheng, Nanning
    2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT-2012), 2012, : 1163 - 1165
  • [50] MOLE: A mobile agent system
    Baumann, J
    Hohl, F
    Rothermel, K
    Strasser, M
    Theilmann, W
    SOFTWARE-PRACTICE & EXPERIENCE, 2002, 32 (06): : 575 - 603