Runtime security verification for itinerary-driven mobile agents

  • Zijiang Yang
  • , Shiyong Lu
  • , Ping Yang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from the specification of its computational behavior. We empower each host with an access control policy so that the host will deny the access from an agent whose itinerary does not conform to the host's access control policy. A host uses model checking algorithms to check if the itinerary of the agent conforms to its access control policy written in μ-calculus, and if so, grant access permission. In order to address the state explosion problem for model checking itineraries, we propose an approach called Model Generation Code. In this approach, instead of verifying the itinerary itself, a host actually checks the conservative models of a mobile agent. If a conservative model does not satisfy the host's access control policy, the mobile agent will provide refined models for further verification. Our preliminary results show that this is a practical and promising approach to ensure the secure execution of mobile agents.

Original languageEnglish
Title of host publicationProceedings - 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
Pages177-184
Number of pages8
DOIs
StatePublished - 2006
Event2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006 - Indianapolis, IN, United States
Duration: 29 Sep 20061 Oct 2006

Publication series

NameProceedings - 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006

Conference

Conference2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
Country/TerritoryUnited States
CityIndianapolis, IN
Period29/09/061/10/06

Fingerprint

Dive into the research topics of 'Runtime security verification for itinerary-driven mobile agents'. Together they form a unique fingerprint.

Cite this