A Flexible Security Framework for Mobile Agent Systems

R.B. Patel and K. Garg

References

  1. [1] S.N. Hyacinth, Software agents: An overview, KnowledgeEngineering Review, 11 (3), 1996, 1–40.
  2. [2] W.M. Farmer, J.D. Guttman, & V. Swarup, Security formobile agents: Issues and requirements, Proc. 19 th NationalInformation Systems Security Conf., Baltimore, MD, October22-25, 1996, 591–597.
  3. [3] G. Karjoth, D. Lange, & M. Oshima, A security model forAglets, IEEE Internet Computing, 1997, 68–77. doi:10.1109/4236.612220
  4. [4] G. Vigna (ed.), Mobile agents and security, LNCS 1419,Springer, Berlin, Heidelberg, 1998.
  5. [5] T. Tamai, Objects and roles: Modeling based on the dualisticview, Information and Software Technology, 41(14), 1999,1005–1010. doi:10.1016/S0950-5849(99)00075-0
  6. [6] G. Glass, Objectspace voyager core package technical overview,D. Milojicic, F. Douglis, & R. Wheeler (Ed.), Mobility: Pro-cesses, computers and agents (USA: Addison Wesley, 1999).
  7. [7] D. Milojicic, F. Douglis, & R. Wheeler (eds), Mobility: Pro-cesses, computers and agents (USA: Addison Wesley, 2000).
  8. [8] N. Karnik, Security in mobile agent systems, doctoral diss.,Department of Computer Science and Engineering, Universityof Minnesota, 1998.
  9. [9] R.B. Patel & K. Garg, Providing security and robustness tomobile agents on open networks, Proc. 6 th Int. Conf. on182Business Information Systems (BIS 2003), Spring, CO, June4-6, 2003, 66–74.
  10. [10] D. Westhoff, M. Schneider, C. Unger, & F. Kaderali, Protectinga mobile agent’s route against collusions, LNCS 1758, Springer-Verlag, 2000, 215–225.
  11. [11] T. Li, C.K. Seng, & K.Y. Lam, A secure route structure forinformation gathering, Proc. 2000 Pacific Rim Int. Conf. onAI, Melbourne, Australia, 2000, 101–114.
  12. [12] J. Mir & J. Borrell, Protecting general flexible itineraries ofmobile agents, Information Security & Cryptography, LNCS2288, Springer-Verlag, 2002, 382–396.
  13. [13] Y. Wang & T. Kian-Lee, Dispatching mobile agents with secureroutes in parallel, Proc. of 3rd International Conference onInformation & Communication Security (ICICS 2001), LNCS2229, Xian, China, Nov 13-16, 2001, 386–397.
  14. [14] W. Jansen & T. Karygiannis, NIST special publication 800-19:Mobile agent security, NIST, Gaithersburg, MD, 2000.
  15. [15] R.B. Patel & K. Garg, PMADE: A platform for mobileagent distribution & execution, Proc. 5 th World MultiConf.on Systemics, Cybernetics and Informatics (SCI2001),Vol. 4,Orlando, FL, 2001, 287–293.
  16. [16] R.B. Patel & K. Garg, A security framework for mobile agentsystems, Proc. 6 th Int. Conf. on Business Information Systems(BIS 2003), Spring, CO, June 4-6, 2003, 49–56.
  17. [17] R. Helton & J. Helton, Mastering Java security: Cryptographyalgorithms and architecture, 1st ed. (India: Wiley, 2002).
  18. [18] L. Gong, Secure Java classloading, IEEE Internet Computing,2 (6), 1998, 56–61. doi:10.1109/4236.735987
  19. [19] D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, & G.Tsudik, Itinerant agents or mobile computing, IEEE PersonalCommunications Magazine, 2, 1995, 34–49. doi:10.1109/98.468361
  20. [20] G. Karjoth, N. Asokan, & U.C. G.ulc, Protecting the com-putation of free roaming agents, Mobile Agents, LNCS 1477,Springer-Verlag, 1998, 194–207.
  21. [21] IKV++GmbH Informations und Kommunikationssyteme,Grasshopper Development Systems, Release 1.2, Basics andConcepts, IKV++ GmbH Informations und Kommunikation-ssyteme, February 1999.
  22. [22] P. Bellavista, A. Corradi, & C. Stefanelli, Protection and in-teroperability for mobile agents: A secure and open program-ming environment, IEICE Trans. on Communication, SpecialIssue on Autonomous Decentralized Systems, E-83-B(5), 2000,961–972.

Important Links:

Go Back