Skip to main content

SECMAP: A Secure Mobile Agent Platform

  • Conference paper
Multi-Agent Systems and Applications IV (CEEMAS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3690))

Abstract

This paper describes a mobile agent platform, Secure Mobile Agent Platform (SECMAP), and its security infrastructure. Unlike other agent systems, SECMAP proposes a new agent model, the shielded agent model, to meet security requirements and provides functionalities which ensure the implementation of the the shielded agent model. It provides secure agent communication and migration facilities, and maintains security policy information to examine agent actions and to prevent undesired/unauthorized activity, while employing cryptographic techniques to meet security constraints.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Franklin, S., Graesser, A.: Is it an Agent, or just a program? A taxonomy for Autonous Agents. In: Proc. Third International Workshop on Agent Theories, Architecures, and Languages. Springer, Heidelberg (1996)

    Google Scholar 

  2. Karnik, N.M., Tripathi, A.R.: Design issues in mobile-agent programming systems. IEEE Concurrency 6(3), 52–61 (1998)

    Article  Google Scholar 

  3. Hauswirth, M., Kerer, C., Kurmanowytsch, R.: A flexible and extensible security framework for Java code, Technical Report TUV-1841-99-14, Technical Univ. of Vienna

    Google Scholar 

  4. Coulouris, G., Dollimore, J., Kindberg, T.: Security. In: Distributed systems - concepts and design, 2nd edn. International Computer Science Series, pp. 477–516. Addison-Wesley, Reading (1994)

    Google Scholar 

  5. Hohl, F.: Protecting mobile agents with blackbox security. In: Proc. 1997 Wksp. Mobile Agents and Security, Univ. of Maryland (October 1997)

    Google Scholar 

  6. Necula, G.C., Lee, P.: Safe, untrusted agents using proofcarrying Code. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 61–91. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant agents for mobile computing. In: Huhns, M.N., Singh, M.P. (eds.) Readings in Agents, pp. 267–282. Morgan Kaufmann, San Francisco (1997)

    Google Scholar 

  8. Farmer, W., Guttmann, J., Swarup, V.: Security for mobile agents: Authentication and state appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 118–130. Springer, Heidelberg (1996)

    Google Scholar 

  9. Bryce, C., Vitek, J.: The JavaSeal Mobile Agent Kernel. Autonomous Agents and Multi- Agent Systems 4, 359–384 (2001)

    Article  Google Scholar 

  10. Varadharan, V., Foster, D.: A Security Architecture for Mobile Agent Based Applications. World Wide Web:Internet and Web Information System 6, 93–122 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ugurlu, S., Erdogan, N. (2005). SECMAP: A Secure Mobile Agent Platform. In: Pěchouček, M., Petta, P., Varga, L.Z. (eds) Multi-Agent Systems and Applications IV. CEEMAS 2005. Lecture Notes in Computer Science(), vol 3690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11559221_11

Download citation

  • DOI: https://doi.org/10.1007/11559221_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29046-9

  • Online ISBN: 978-3-540-31731-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics