loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Kevin Foltz and William R. Simpson

Affiliation: Institute for Defense Analyses, 4850 Mark Center Drive, Alexandria, VA 22311 and U.S.A.

Keyword(s): Enterprise, Software Agent, System Design, Confidentiality, Integrity, Application Security, Security, End-to-end Encryption, Mobile Device Management, Host based Security.

Related Ontology Subjects/Areas/Topics: Cloud Computing ; Collaboration and e-Services ; Computer-Supported Education ; Data Engineering ; e-Business ; Enterprise Information Systems ; Information Systems Analysis and Specification ; Information Technologies Supporting Learning ; Internet Agents ; Mobile Software and Services ; Ontologies and the Semantic Web ; Security ; Security and Privacy ; Services Science ; Software Agents and Internet Computing ; Software Engineering ; Software Engineering Methods and Techniques ; Telecommunications ; Virtual Enterprises ; Web Services ; Wireless and Mobile Computing ; Wireless and Mobile Technologies ; Wireless Information Networks and Systems

Abstract: Software agents are installed on endpoint devices to monitor local activity, prevent harmful behavior, allow remote management, and report back to the enterprise. The challenge in this environment is the security of the agents and their communication with the enterprise. This work presents an agent architecture that operates within a high-security Enterprise Level Security (ELS) architecture that preserves end-to-end integrity, encryption, and accountability. This architecture uses secure hardware for sensitive key operations and device attestation. Software agents leverage this hardware security to provide services consistent with the ELS framework. This enables an enterprise to manage and secure all endpoint device agents and their communications with other enterprise services.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.219.189.247

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Foltz, K. and Simpson, W. (2019). Secure Endpoint Device Agent Architecture. In Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 1: ICEIS; ISBN 978-989-758-372-8; ISSN 2184-4984, SciTePress, pages 547-554. DOI: 10.5220/0007658705470554

@conference{iceis19,
author={Kevin Foltz. and William R. Simpson.},
title={Secure Endpoint Device Agent Architecture},
booktitle={Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 1: ICEIS},
year={2019},
pages={547-554},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007658705470554},
isbn={978-989-758-372-8},
issn={2184-4984},
}

TY - CONF

JO - Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 1: ICEIS
TI - Secure Endpoint Device Agent Architecture
SN - 978-989-758-372-8
IS - 2184-4984
AU - Foltz, K.
AU - Simpson, W.
PY - 2019
SP - 547
EP - 554
DO - 10.5220/0007658705470554
PB - SciTePress