作者: Timothy W. van der Horst , Tore Sundelin , Kent E. Seamons , Charles D. Knutson
关键词:
摘要: We examine several architectures for extending the nascent technology of automated trust negotiation to bring nonidentity-based authentication and authorization mobile devices. how location agents secure repositories affects such a system. also present an implementation one these models. This protocol leverages software proxies, autonomous agents, allow portable devices from different security domains (i.e., with no pre-existing relationship) establish perform transactions. proposed system is called surrogate as sensitive resource-intense tasks are performed vicariously device by agent.