Advertisement

Security for Mobile Agents

  • Nobukazu Yoshioka
  • Yasuyuki Tahara
  • Akihiko Ohsuga
  • Shinichi Honiden
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1957)

Abstract

In view of the proliferation and expansion of wide-area open networks such as the intranets and extra-nets, agent technology is attracting greater attention. However, as yet there is well-established and widely used method of developing safe and secure agent systems. In this paper, we propose a methodology that supports the step-by-step development of mobile agent systems while ensuring consideration of security issues. This approach results in a robust infrastructure for practical system development, and by supporting calculation of various costs allows efficiency and security tradeoffs to be objectively evaluated.

Keywords

Migration Model Agent Platform Sign Verification Agent Pattern Mobile Agent System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Shimshon Berkovits, Joshua D. Guttman, and Vipin Swarup, Authentication for mobile agents, in Vigna [8], pp. 114–136.Google Scholar
  2. 2.
    David M. Chess, Security issues in mobile code systems, in Vigna [8], pp. 1–14.Google Scholar
  3. 3.
    Fritz Hohl, Time limited blackbox security; protecting mobile agents from malicious hosts, in Vigna [8], pp. 92–113.Google Scholar
  4. 4.
    George C. Necula and Peter Lee, Safe, untrusted agents using proof-carrying code, in Vigna [8], pp. 61–91.Google Scholar
  5. 5.-John K. Ousterhout, Jacob Y. Levy, and Brent B. Welch, The Safe-Tcl security model, in Vigna [8], pp. 217–234.Google Scholar
  6. 6.
    Tomas Sander and Christian F. Tschudin, Protecting mobile agents against malicious hosts, in Vigna [8], pp. 44–60.Google Scholar
  7. 7.
    Giovanni Vigna, Cryptographic traces for mobile agents, in Moblie Agents and Security [8], pp. 137–153.Google Scholar
  8. 8.
    Giovanni Vigna, editor, Moblie Agents and Security, LNCS 1419, Springer Verlag, 1998.Google Scholar
  9. 9.
    Yariv Aridor and Danny B. Lange, Agent design patterns: Elements of agent application design, in Proceedings of Agents’98, 1998.Google Scholar
  10. 10.
    Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides, Design Patterns, Addison-Wesley, 1995.Google Scholar
  11. 11.
    Elizabeth A. Kendall, Chirag V. Pathak, P. V. Murali Krishna, and C. B. Suresh, The layered agent pattern language, in Proceedings of PLoP’97, 1997.Google Scholar
  12. 12.
    Alberto Silva and José Delgado, The agent pattern: A design pattern for dynamic and distributed applications, in Third European Conference on Pattern Languages of Programming and Computing, 1998.Google Scholar
  13. 13.
    Tahara, Y., Ohsuga, A. and Honiden, S., Agent System Development Method Based on Agent Patterns, in Proceedings of the 21st International Conference on Software Engineering, acm PRESS, pp.356–367, 1999.Google Scholar
  14. 14.
    Amund Aarsten, Davide Brugali, and Giuseppe Menga, Patterns for cooperation, in Proceedings of PLOP’96, 1996.Google Scholar
  15. 15.
    Steven Y. Goldsmith, Shanon V. Spires, and Laurence R. Phillips, Object framework for agent system development, in Proceedings of AAAI-98Workshop on Software Tools for Developing Agents, 1998.Google Scholar
  16. 16.
    Robert Tolksdorf, Coordination patterns of mobile information agents, in Matthias Klusch and Gerhard Weiß, editors, Cooperative Information Agents II, pp. 246–261, 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Nobukazu Yoshioka
    • 1
  • Yasuyuki Tahara
    • 1
  • Akihiko Ohsuga
    • 1
  • Shinichi Honiden
    • 2
  1. 1.Corporate Research & Development CenterTOSHIBA CorpSaiwai-kuJapan
  2. 2.National Institute of InformaticsTokyhoJapan

Personalised recommendations