A Flexible Security Framework for Mobile Agent Systems

R.B. Patel and K. Garg

References

  1. [1] S.N. Hyacinth, Software agents: An overview, Knowledge Engineering Review, 11 (3), 1996, 1–40.
  2. [2] W.M. Farmer, J.D. Guttman, & V. Swarup, Security for mobile agents: Issues and requirements, Proc. 19 th National Information Systems Security Conf., Baltimore, MD, October 22-25, 1996, 591–597.
  3. [3] G. Karjoth, D. Lange, & M. Oshima, A security model for Aglets, IEEE Internet Computing, 1997, 68–77. doi:10.1109/4236.612220
  4. [4] G. Vigna (ed.), Mobile agents and security, LNCS 1419, Springer, Berlin, Heidelberg, 1998.
  5. [5] T. Tamai, Objects and roles: Modeling based on the dualistic view, Information and Software Technology, 41(14), 1999, 1005–1010. doi:10.1016/S0950-5849(99)00075-0
  6. [6] G. Glass, Objectspace voyager core package technical overview, D. Milojicic, F. Douglis, & R. Wheeler (Ed.), Mobility: Processes, computers and agents (USA: Addison Wesley, 1999).
  7. [7] D. Milojicic, F. Douglis, & R. Wheeler (eds), Mobility: Processes, computers and agents (USA: Addison Wesley, 2000).
  8. [8] N. Karnik, Security in mobile agent systems, doctoral diss., Department of Computer Science and Engineering, University of Minnesota, 1998.
  9. [9] R.B. Patel & K. Garg, Providing security and robustness to mobile agents on open networks, Proc. 6 th Int. Conf. on 182 Business Information Systems (BIS 2003), Spring, CO, June 4-6, 2003, 66–74.
  10. [10] D. Westhoff, M. Schneider, C. Unger, & F. Kaderali, Protecting a mobile agent’s route against collusions, LNCS 1758, SpringerVerlag, 2000, 215–225.
  11. [11] T. Li, C.K. Seng, & K.Y. Lam, A secure route structure for information gathering, Proc. 2000 Pacific Rim Int. Conf. on AI, Melbourne, Australia, 2000, 101–114.
  12. [12] J. Mir & J. Borrell, Protecting general flexible itineraries of mobile agents, Information Security & Cryptography, LNCS 2288, Springer-Verlag, 2002, 382–396.
  13. [13] Y. Wang & T. Kian-Lee, Dispatching mobile agents with secure routes in parallel, Proc. of 3rd International Conference on Information & Communication Security (ICICS 2001), LNCS 2229, Xian, China, Nov 13-16, 2001, 386–397.
  14. [14] W. Jansen & T. Karygiannis, NIST special publication 800-19: Mobile agent security, NIST, Gaithersburg, MD, 2000.
  15. [15] R.B. Patel & K. Garg, PMADE: A platform for mobile agent distribution & execution, Proc. 5 th World MultiConf. on Systemics, Cybernetics and Informatics (SCI2001),Vol. 4, Orlando, FL, 2001, 287–293.
  16. [16] R.B. Patel & K. Garg, A security framework for mobile agent systems, Proc. 6 th Int. Conf. on Business Information Systems (BIS 2003), Spring, CO, June 4-6, 2003, 49–56.
  17. [17] R. Helton & J. Helton, Mastering Java security: Cryptography algorithms and architecture, 1st ed. (India: Wiley, 2002).
  18. [18] L. Gong, Secure Java classloading, IEEE Internet Computing, 2 (6), 1998, 56–61. doi:10.1109/4236.735987
  19. [19] D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, & G. Tsudik, Itinerant agents or mobile computing, IEEE Personal Communications Magazine, 2, 1995, 34–49. doi:10.1109/98.468361
  20. [20] G. Karjoth, N. Asokan, & U.C. G.ulc, Protecting the computation of free roaming agents, Mobile Agents, LNCS 1477, Springer-Verlag, 1998, 194–207.
  21. [21] IKV++GmbH Informations und Kommunikationssyteme, Grasshopper Development Systems, Release 1.2, Basics and Concepts, IKV++ GmbH Informations und Kommunikationssyteme, February 1999.
  22. [22] P. Bellavista, A. Corradi, & C. Stefanelli, Protection and interoperability for mobile agents: A secure and open programming environment, IEICE Trans. on Communication, Special Issue on Autonomous Decentralized Systems, E-83-B(5), 2000, 961–972.

Important Links:

Go Back