ABSTRACT

The security threats from mobile agent include unauthorized attempts, tampering and unauthorized access. Unauthorized attempts are that users attempt to obtain the sensitive information belonging to someone else. Tampering means someone wants to change the value or code of mobile agents, such as viruses or malicious and erroneous code. Unauthorized access of remote resource may cause the remote system unsafe. The security model includes three security mechanisms: authentication and authorization, verification and run-time limitation mechanisms. The security model is shown in Fig.l.