Efficient key management scheme for hierarchical access control in mobile agents

Mobile agents have great potential for increasing the realized benefit for a variety of e-commerce applications. However, enabling the mobile agent to safely travel over the open and uncontrollable Internet is necessary to protect the contents of a mobile agent. Recently, many agent structures that manage the keys needed to provide the access control mechanism for mobile agents have been developed. Nevertheless, these structures require either large amount of mobile codes or heavy computation loads. In this paper, a lightweight key management method for hierarchical access control in mobile agent environments is proposed. This method not only provides access control for mobile agents but also reduces the agent size as well as cuts down the computations cost.

[1]  Min-Shiang Hwang,et al.  Efficient access control and key management schemes for mobile agents , 2004, Comput. Stand. Interfaces.

[2]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[3]  Athanasios T. Karygiannis,et al.  SP 800-19. Mobile Agent Security , 1999 .

[4]  Volker Roth,et al.  Access control and key management for mobile agents , 1998, Comput. Graph..

[5]  Danny B. Lange,et al.  Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .

[6]  Joos Vandewalle,et al.  (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.

[7]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[8]  Timothy K. Shih Mobile agent evolution computing , 2001, Inf. Sci..

[9]  B. C. Brookes,et al.  Information Sciences , 2020, Cognitive Skills You Need for the 21st Century.

[10]  Steven Walczak,et al.  Auction Advisor: an agent-based online-auction decision support system , 2006, Decis. Support Syst..

[11]  Wayne Jansen,et al.  NIST Special Publication 800-19 – Mobile Agent Security , 2000 .

[12]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[13]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[14]  Ahmed Karmouch Mobile Software Agents for Telecommunications , 1998, IEEE Communications Magazine.

[15]  Mazliza Othman,et al.  Secure and auditable agent-based e-marketplace framework for mobile users , 2008, Comput. Stand. Interfaces.