Abstract
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the environment requires devices to interact opportunistically when resources are available. Such interactions occur unpredictably as device users have no advance knowledge of others they will encounter. The openness of these environments also requires users to protect themselves and their data from unwanted interactions while maintaining desired, yet unscripted, coordination. As the ubiquity of communicating mobile devices increases, the number of applications supported by the network grows drastically and managing access control is crucial to such systems. Application agents must directly manipulate and examine access policies because these networks are often decoupled from a fixed infrastructure, rendering reliance on centralized servers for authentication and access policies impractical. In this paper, we explore context-aware access control policies tailored to the needs of agent coordination in open environments that exhibit mobility. We propose and evaluate novel constructs to support such policies, especially in the presence of large numbers of highly dynamic application agents.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming Languages and Systems 7, 80–112 (1985)
Kaufman, J., Lehman, T.: OptimalGrid: The almaden SmartGrid project: Autonomous optimization of distributed computing on the grid. IEEE Task Force on Cluster Computing 4 (2003)
Wyckoff, P., McLaughry, S., Lehman, T., Ford, D.: TSpaces. IBM Systems Journal 37 (1998)
Freeman, E., Hupfer, S., Arnold, K.: JavaSpaces Principles, Patterns, and Practice. Addison-Wesley, Reading (1999)
Murphy, A.L., Picco, G.P., Roman, G.C.: Lime: A middleware for physical and logical mobility. In: Proceedings of the 21st International Conference on Distributed Computing Systems, pp. 524–533 (2001)
Julien, C., Roman, G.C.: Egocentric context-aware programming in ad hoc mobile environments. In: Proceedings of the 10th International Symposium on the Foundations of Software Engineering (2002)
Cabri, G., Leonardi, L., Zambonelli, F.: MARS: A programmable coordination architecture for mobile agents. Internet Computing 4, 26–35 (2000)
Moore, J.: Mobile code security techniques. Technical Report MIS-CIS-98-28, University of Pennsylvania (1998)
White, J.: Telescript technology: The foundation for the electronic marketplace. General Magic White Paper, General Magic, Inc. (1994)
Gray, R.S., Kotz, D., Cybenko, G., Rus, D.: D’Agents: Security in a multiple-language, mobile-agent system. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)
Gray, R.: Agent tcl: A flexible and secure mobile-agent system. In: Proceedings of the 4th Annual Tcl/Tk Workshop (1996)
Necula, G.: Proof-carrying code. In: Proceedings of the Symposium on Principles of Programming Languages (1997)
Sander, T., Tschudin, C.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)
Borselius, N., Mitchell, C.J., Wilson, A.: Undetachable threshold signatures. In: Cryptography and Coding—Proceedings of the 8th IMA International Conference. LNCS, vol. 2360, pp. 239–244. Springer, Heidelberg (2001)
Papadimitratos, P., Haas, Z.: Secure data transmission in mobile ad hoc networks. In: Proceedings of the 2003 ACM Workshop on Wireless Security, pp. 41–50 (2003)
National Center for Supercomputing Applications, Integrated Decision Technologies Group: SAMCat: A securable active metadata catalogue (2002)
Byrd, G., Gong, F., Sargor, C., Smith, T.: Yalta: A secure collaborative space for dynamic coalitions. In: IEEE 2nd SMC Information Assurance Workshop (2001)
Cremonini, M., Omicini, A., Zambonelli, F.: Coordination and access control in open distributed agent systems: the TuCSoN approach. In: Porto, A., Roman, G.-C. (eds.) COORDINATION 2000. LNCS, vol. 1906, pp. 99–114. Springer, Heidelberg (2000)
Bryce, C., Oriol, M., Vitek, J.: A coordination model for agents based on secure spaces. In: Ciancarini, P., Wolf, A. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 4–20. Springer, Heidelberg (2008)
Handorean, R., Roman, G.C.: Secure servise provision in ad hoc networks. In: Proceedings of the 1st International Conference on Service Oriented Computing (2003)
Minsky, N., Minsky, Y., Ungureanu, V.: Safe tuplespace-based coordination in multi agent systems. Journal of Applied Artificial Intelligence 15 (2001)
Kang, P., Borcea, C., Xu, G., Saxena, A., Kremer, U., Iftode, L.: Smart messages: A distributed computing platform for networks of embedded systems. The Computer Journal Special Issue on Mobile and Pervasive Computing (to appear)
Keoh, S.L., Lupu, E.: Towards flexible credential verification in mobile ad hoc networks. In: Proceedings of the ACM Workshop on Principles of Mobile Computing, pp. 58–65 (2002)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 42–51 (2003)
Weimerskirch, A., Thonet, G.: A distributed light-weight authentication model for ad hoc networks. In: Proceedings of the 4th International Conference on Information Security and Cryptology, pp. 341–354 (2001)
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad hoc wireless networks. In: Network and Distributed System Security Symposium (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Julien, C., Payton, J., Roman, GC. (2005). Adaptive Access Control in Coordination-Based Mobile Agent Systems. In: Choren, R., Garcia, A., Lucena, C., Romanovsky, A. (eds) Software Engineering for Multi-Agent Systems III. SELMAS 2004. Lecture Notes in Computer Science, vol 3390. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31846-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-31846-0_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24843-9
Online ISBN: 978-3-540-31846-0
eBook Packages: Computer ScienceComputer Science (R0)