Advertisement

Agent Based Security for the Active Network Infrastructure

  • Stamatis Karnouskos
  • Ingo Busse
  • Stefan Covaci
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1653)

Abstract

Security in Active Networks is still in its infancy! This paper presents a new Agent-Based Security architecture for the Active Network Infrastructure (ABSANI). It is explained why agents in combination with Java are considered the appropriate solution for security architecture and how this can be applied in the Active Networks. An agent-based Active Node architecture is introduced and ABSANI is placed within that approach. Subsequently, all the basic components of the ABSANI are analyzed arguing for the benefits they offer. Finally an application scenario of Place-oriented Virtual Private Networks is demonstrated.

Keywords

Mobile Agent Active Node Security Architecture Agent Platform Security Check 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adam, C.M., Huard, J.-F., Lazar, A.A., Lim, K.-S., Nandikesan, M., Shim, E.: Proposal for Standardization of ATM Binding Interface Base 2.1. submitted to P1520 (January 1999)Google Scholar
  2. 2.
    Mobile Agent System Interoperability Facility, http://www.fokus.gmd.de/research/cc/ima/masif/
  3. 3.
    OMG Web Site: http://www.omg.org/
  4. 4.
    The KeyNote Trust-Management System, http://www.cis.upenn.edu/~angelos/keynote.html
  5. 5.
    Simple Public Key Infrastructure, http://www.ietf.org/html.charters/spki-charter.html
  6. 6.
    Yellin, F.: Low Level Security in Java (1997), deleted from www.javasoft.com
  7. 7.
    Venners, B.: Security and the Class Verifier. JavaWorld (October 1997), http://www.javaworld.com/javaworld/jw-10-1997/
  8. 8.
    Venners, B.: Security and the Class Loader Architecture. JavaWorld (Septermber 1997), http://www.javaworld.com/javaworld/jw-09-1997/
  9. 9.
    Venners, B.: Java Security: How to Install the Security Manager and Customize your Security Policy. JavaWorld (November 1997), http://www.javaworld.com/javaworld/jw-11-1997/
  10. 10.
    IKV++ GmbH - Grasshopper, http://www.ikv.de/products/grasshopper

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Stamatis Karnouskos
    • 1
  • Ingo Busse
    • 1
  • Stefan Covaci
    • 1
  1. 1.Research Institute for Open Communication Systems (GMD-FOKUS)German National Research Center for Information TechnologyBerlinGermany

Personalised recommendations