Policy and state based secure wrapper and its application to mobile agents

A. Binun, E. Gudes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Execution process in modern Web applications is usually represented as a partially ordered sequence of basic actions issued by a client (login, buy, exit, etc.; the login action usually precedes purchasing). Based on these actions, a finite automaton of fine-grained authorization checks, may be specified in a separate layer that is easily configurable for security needs of a particular application. In the Mobile case there may be two such state machines - one performing state-based authorization checks of the application execution process and the other performing such checks for the mobile agent execution process. Authorization checks of these machines may be both state-based and policy based, and the policies should distinguish between human clients and mobile agents cases. We develop the framework to specify and enforce finegrained state-based authorization checks of Web application execution, consisting of a Web browser (client) and a server. We adopt this framework to the mobile case so that state machines representing finegrained authorization checks of application and mobile agent execution are synchronized.

Original languageEnglish
Title of host publicationProceedings - 1st Latin American Web Congress
Subtitle of host publicationEmpowering our Web, LA-WEB 2003
PublisherInstitute of Electrical and Electronics Engineers
Pages14-26
Number of pages13
ISBN (Electronic)0769520588, 9780769520582
DOIs
StatePublished - 1 Jan 2003
Event1st Latin American Web Congress, LA-WEB 2003 - Santiago, Chile
Duration: 10 Nov 200312 Nov 2003

Publication series

NameProceedings - 1st Latin American Web Congress: Empowering our Web, LA-WEB 2003

Conference

Conference1st Latin American Web Congress, LA-WEB 2003
Country/TerritoryChile
CitySantiago
Period10/11/0312/11/03

Keywords

  • Mobile agents

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Policy and state based secure wrapper and its application to mobile agents'. Together they form a unique fingerprint.

Cite this