Authors:
Kevin Foltz
and
William R. Simpson
Affiliation:
Institute for Defense Analyses, 4850 Mark Center Drive, Alexandria, VA 22311 and U.S.A.
Keyword(s):
Enterprise, Software Agent, System Design, Confidentiality, Integrity, Application Security, Security, End-to-end Encryption, Mobile Device Management, Host based Security.
Related
Ontology
Subjects/Areas/Topics:
Cloud Computing
;
Collaboration and e-Services
;
Computer-Supported Education
;
Data Engineering
;
e-Business
;
Enterprise Information Systems
;
Information Systems Analysis and Specification
;
Information Technologies Supporting Learning
;
Internet Agents
;
Mobile Software and Services
;
Ontologies and the Semantic Web
;
Security
;
Security and Privacy
;
Services Science
;
Software Agents and Internet Computing
;
Software Engineering
;
Software Engineering Methods and Techniques
;
Telecommunications
;
Virtual Enterprises
;
Web Services
;
Wireless and Mobile Computing
;
Wireless and Mobile Technologies
;
Wireless Information Networks and Systems
Abstract:
Software agents are installed on endpoint devices to monitor local activity, prevent harmful behavior, allow remote management, and report back to the enterprise. The challenge in this environment is the security of the agents and their communication with the enterprise. This work presents an agent architecture that operates within a high-security Enterprise Level Security (ELS) architecture that preserves end-to-end integrity, encryption, and accountability. This architecture uses secure hardware for sensitive key operations and device attestation. Software agents leverage this hardware security to provide services consistent with the ELS framework. This enables an enterprise to manage and secure all endpoint device agents and their communications with other enterprise services.