Skip to main content

Security for Mobile Agents

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1957))

Abstract

In view of the proliferation and expansion of wide-area open networks such as the intranets and extra-nets, agent technology is attracting greater attention. However, as yet there is well-established and widely used method of developing safe and secure agent systems. In this paper, we propose a methodology that supports the step-by-step development of mobile agent systems while ensuring consideration of security issues. This approach results in a robust infrastructure for practical system development, and by supporting calculation of various costs allows efficiency and security tradeoffs to be objectively evaluated.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shimshon Berkovits, Joshua D. Guttman, and Vipin Swarup, Authentication for mobile agents, in Vigna [8], pp. 114–136.

    Google Scholar 

  2. David M. Chess, Security issues in mobile code systems, in Vigna [8], pp. 1–14.

    Google Scholar 

  3. Fritz Hohl, Time limited blackbox security; protecting mobile agents from malicious hosts, in Vigna [8], pp. 92–113.

    Google Scholar 

  4. George C. Necula and Peter Lee, Safe, untrusted agents using proof-carrying code, in Vigna [8], pp. 61–91.

    Google Scholar 

  5. 5.-John K. Ousterhout, Jacob Y. Levy, and Brent B. Welch, The Safe-Tcl security model, in Vigna [8], pp. 217–234.

    Google Scholar 

  6. Tomas Sander and Christian F. Tschudin, Protecting mobile agents against malicious hosts, in Vigna [8], pp. 44–60.

    Google Scholar 

  7. Giovanni Vigna, Cryptographic traces for mobile agents, in Moblie Agents and Security [8], pp. 137–153.

    Google Scholar 

  8. Giovanni Vigna, editor, Moblie Agents and Security, LNCS 1419, Springer Verlag, 1998.

    Google Scholar 

  9. Yariv Aridor and Danny B. Lange, Agent design patterns: Elements of agent application design, in Proceedings of Agents’98, 1998.

    Google Scholar 

  10. Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides, Design Patterns, Addison-Wesley, 1995.

    Google Scholar 

  11. Elizabeth A. Kendall, Chirag V. Pathak, P. V. Murali Krishna, and C. B. Suresh, The layered agent pattern language, in Proceedings of PLoP’97, 1997.

    Google Scholar 

  12. Alberto Silva and José Delgado, The agent pattern: A design pattern for dynamic and distributed applications, in Third European Conference on Pattern Languages of Programming and Computing, 1998.

    Google Scholar 

  13. Tahara, Y., Ohsuga, A. and Honiden, S., Agent System Development Method Based on Agent Patterns, in Proceedings of the 21st International Conference on Software Engineering, acm PRESS, pp.356–367, 1999.

    Google Scholar 

  14. Amund Aarsten, Davide Brugali, and Giuseppe Menga, Patterns for cooperation, in Proceedings of PLOP’96, 1996.

    Google Scholar 

  15. Steven Y. Goldsmith, Shanon V. Spires, and Laurence R. Phillips, Object framework for agent system development, in Proceedings of AAAI-98Workshop on Software Tools for Developing Agents, 1998.

    Google Scholar 

  16. Robert Tolksdorf, Coordination patterns of mobile information agents, in Matthias Klusch and Gerhard Weiß, editors, Cooperative Information Agents II, pp. 246–261, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoshioka, N., Tahara, Y., Ohsuga, A., Honiden, S. (2001). Security for Mobile Agents. In: Ciancarini, P., Wooldridge, M.J. (eds) Agent-Oriented Software Engineering. AOSE 2000. Lecture Notes in Computer Science, vol 1957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44564-1_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-44564-1_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41594-7

  • Online ISBN: 978-3-540-44564-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics