Secure Endpoint Device Agent Architecture

Kevin Foltz, William Simpson

Abstract

Software agents are installed on endpoint devices to monitor local activity, prevent harmful behavior, allow remote management, and report back to the enterprise. The challenge in this environment is the security of the agents and their communication with the enterprise. This work presents an agent architecture that operates within a high-security Enterprise Level Security (ELS) architecture that preserves end-to-end integrity, encryption, and accountability. This architecture uses secure hardware for sensitive key operations and device attestation. Software agents leverage this hardware security to provide services consistent with the ELS framework. This enables an enterprise to manage and secure all endpoint device agents and their communications with other enterprise services.

Download


Paper Citation


in Harvard Style

Foltz K. and Simpson W. (2019). Secure Endpoint Device Agent Architecture.In Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 1: ICEIS, ISBN 978-989-758-372-8, pages 547-554. DOI: 10.5220/0007658705470554


in Bibtex Style

@conference{iceis19,
author={Kevin Foltz and William Simpson},
title={Secure Endpoint Device Agent Architecture},
booktitle={Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 1: ICEIS,},
year={2019},
pages={547-554},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007658705470554},
isbn={978-989-758-372-8},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 1: ICEIS,
TI - Secure Endpoint Device Agent Architecture
SN - 978-989-758-372-8
AU - Foltz K.
AU - Simpson W.
PY - 2019
SP - 547
EP - 554
DO - 10.5220/0007658705470554