Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A Security Model for Aglets

Published: 01 July 1997 Publication History

Abstract

Mobile agents offer a new paradigm for distributed computation, but their potential benefits must be weighed against the very real security threats they pose. These threats originate not just in malicious agents but in malicious hosts as well. For example, if there is no mechanism to prevent attacks, a host can implant its own tasks into an agent or modify the agent's state. This can lead in turn to theft of the agent's resources if it has to pay for the execution of tasks, or to loss of the agent's reputation if its state changes from one host to another in ways that alter its behavior in negative ways. Aglets are mobile agents developed at IBM's Tokyo Research Laboratory. The article describes a security model for the Aglets development environment that supports flexible architectural definition of security policies

References

[1]
J.J. Ordille, "When Agents Roam, Who Can You Trust?" Proc. First Conf. on Emerging Technologies and Applications in Communications (etaCOM), http://etacom.org/, May 1996.
[2]
W.M. Farmer J.D. Guttman and V. Swarup, "Security for Mobile Agents: Issues and Requirements," Proc. 19th Nat'l Information Systems Security Conf. (NISSC 96), 1996, pp. 591-597.
[3]
R.S. Gray, "Agent Tcl: A Flexible and Secure Mobile-Agent System, in Proc. Fourth Annual Tcl/Tk Workshop (TCL 96), 1996.
[4]
J. Tardo and L. Valente., "Mobile Agent Security and Telescript," Proc. IEEE CompCon 96, IEEE Computer Society Press, Los Alamitos, Calif., 1996.
[5]
D.B. Lange and M. Oshima, Java Agent API: Programming and Deploying Aglets with Java, to be published by Addison-Wesley, Fall 1997; a working draft, "Programming Mobile Agents in Java, is available at http://www.trl.ibm.co.jp/aglets/whitepaper.htm.
[6]
B. Sommers, "Agents: Not Just for Bond Anymore," JavaWorld, http://www.javaworld.com/javaworld/jw-04-1997/jw-04-agents.html, April 1997.
[7]
B. Venners, "The Architecture of Aglets," JavaWorld, http://www.javaworld.com/javaworld/jw-04-1997/jw-04-hood.html, April 1997.
[8]
B. Venners, "Solve Real Problems with Aglets, a Type of Mobile Agent," JavaWorld, http://www.javaworld.com/javaworld/jw-05-1997/jw-05-hood.html, May 1997.
[9]
D.B. Lange, "Java Aglet Application Programming Interface (J-AAPI)," white paper-draft no. 2, http://www.trl.ibm.co.jp/aglets/aglet-book.html.
[10]
D. Chess, et al., "Itinerant Agents for Mobile Computing," IEEE Personal Communications, Vol. 2, No. 5, Oct. 1995, pp. 34-49.
[11]
D. Chess, "Things That Go Bump in the Net," http://www.research.ibm.com/massive/bump.html, 1995.
[12]
C. Thirunavukkarasu T. Finin and J. Mayfield, "Secret Agents: A Security Architecture for the KQML Agent Communication Language," Proc. Intelligent Information Agents Workshop held in conjunction with Fourth Int'l Conf. Information and Knowledge Management CIKM 95, Baltimore, Dec. 1995.
[13]
L. Gong, "New Security Architectural Directions for Java," Proc. IEEE CompCon 97, IEEE Computer Society Press, Los Alamitos, Calif., 1997, pp. 97-102.

Cited By

View all
  • (2012)Statistical behaviors of mobile agents in network routingThe Journal of Supercomputing10.1007/s11227-008-0220-260:3(360-388)Online publication date: 1-Jun-2012
  • (2012)Evolution of extensible java EE-Based agent frameworkProceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications10.1007/978-3-642-30947-2_49(444-453)Online publication date: 25-Jun-2012
  • (2011)Mobile agent code updating and authentication protocol for code-centric RFID systemProceedings of the IFIP TC 6th international conference on Networking10.5555/2039912.2039938(243-250)Online publication date: 13-May-2011
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Internet Computing
IEEE Internet Computing  Volume 1, Issue 4
July 1997
99 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 July 1997

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2012)Statistical behaviors of mobile agents in network routingThe Journal of Supercomputing10.1007/s11227-008-0220-260:3(360-388)Online publication date: 1-Jun-2012
  • (2012)Evolution of extensible java EE-Based agent frameworkProceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications10.1007/978-3-642-30947-2_49(444-453)Online publication date: 25-Jun-2012
  • (2011)Mobile agent code updating and authentication protocol for code-centric RFID systemProceedings of the IFIP TC 6th international conference on Networking10.5555/2039912.2039938(243-250)Online publication date: 13-May-2011
  • (2009)A mobile intelligent negotiation agent embedded and hybrid architecture based online purchasing systemInternational Journal of Wireless and Mobile Computing10.1504/IJWMC.2009.0293493:4(288-298)Online publication date: 1-Nov-2009
  • (2009)Design of RBAC-based secure KAgent framework for home network applicationsProceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia10.1145/1821748.1821873(642-646)Online publication date: 14-Dec-2009
  • (2007)A review of information security issues and respective research contributionsACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/1216218.121622438:1(60-80)Online publication date: 28-Feb-2007
  • (2007)SMASHSoftware Engineering for Multi-Agent Systems V10.1007/978-3-540-73131-3_6(99-116)Online publication date: 1-Feb-2007
  • (2006)A secure modular mobile agent systemProceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems10.1145/1138063.1138076(67-74)Online publication date: 22-May-2006
  • (2006)The probability of success of mobile agents when routing in faulty networksProceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development10.1007/11610113_8(76-84)Online publication date: 16-Jan-2006
  • (2005)Distributed agent architecture for packet filtering & monitoring in networked computersProceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science10.5555/1374038.1374059(1-6)Online publication date: 25-Apr-2005
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media