TY - GEN
T1 - Runtime security verification for itinerary-driven mobile agents
AU - Yang, Zijiang
AU - Lu, Shiyong
AU - Yang, Ping
PY - 2006
Y1 - 2006
N2 - We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from the specification of its computational behavior. We empower each host with an access control policy so that the host will deny the access from an agent whose itinerary does not conform to the host's access control policy. A host uses model checking algorithms to check if the itinerary of the agent conforms to its access control policy written in μ-calculus, and if so, grant access permission. In order to address the state explosion problem for model checking itineraries, we propose an approach called Model Generation Code. In this approach, instead of verifying the itinerary itself, a host actually checks the conservative models of a mobile agent. If a conservative model does not satisfy the host's access control policy, the mobile agent will provide refined models for further verification. Our preliminary results show that this is a practical and promising approach to ensure the secure execution of mobile agents.
AB - We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from the specification of its computational behavior. We empower each host with an access control policy so that the host will deny the access from an agent whose itinerary does not conform to the host's access control policy. A host uses model checking algorithms to check if the itinerary of the agent conforms to its access control policy written in μ-calculus, and if so, grant access permission. In order to address the state explosion problem for model checking itineraries, we propose an approach called Model Generation Code. In this approach, instead of verifying the itinerary itself, a host actually checks the conservative models of a mobile agent. If a conservative model does not satisfy the host's access control policy, the mobile agent will provide refined models for further verification. Our preliminary results show that this is a practical and promising approach to ensure the secure execution of mobile agents.
UR - https://www.scopus.com/pages/publications/35248845800
U2 - 10.1109/DASC.2006.42
DO - 10.1109/DASC.2006.42
M3 - 会议稿件
AN - SCOPUS:35248845800
SN - 0769525393
SN - 9780769525396
T3 - Proceedings - 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
SP - 177
EP - 184
BT - Proceedings - 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
T2 - 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
Y2 - 29 September 2006 through 1 October 2006
ER -