A Secure Modular Mobile Agent System TR-UTEDGE-2006-003

نویسندگان

  • Adam Pridgen
  • Christine Julien
چکیده

Applications in mobile multi-agent systems require a high degree of confidence that code that runs inside the system will not be malicious and that any agents which are malicious can be identified and contained. Since the inception of mobile agents, this threat has been addressed using a multitude of techniques, but many of these implementations have only addressed concerns from the position of either the platform or the agent, and very few approaches have attempted to approach the problem of mobile agent security from both perspectives simultaneously. Furthermore, no middleware exists that facilitates provision of the required security qualities of mobile agent software while extensively focusing on easing the software development burden. In this paper, we introduce a middleware system that eases the integration of core software assurance qualities into the mobile agent software development process by addressing perspectives from positions the of both the platform and the agent.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SMASH: Modular Security for Mobile Agents TR-UTEDGE-2006-007

Mobile agent systems of the future will be used for secure information delivery and retrieval, off-line searching and purchasing, and even system software updates. As part of such applications, agent and platform integrity must be maintained, confidentiality between agents and the intended platform parties must be preserved, and accountability of agents and their platform counterparts must be s...

متن کامل

SICC: Source Initiated Context Construction in Mobile Ad Hoc Networks TR-UTEDGE-2005-003

Context-aware computing is characterized by software’s ability to continuously adapt its behavior to an environment over which it has little control. This style of interaction is imperative in ad hoc mobile networks that consist of numerous mobile hosts coordinating opportunistically via transient wireless connections. In this paper, we provide a formal abstract characterization of an applicati...

متن کامل

EgoSpaces: Facilitating Rapid Development of Context-Aware Mobile Applications TR-UTEDGE-2005-004

Today’s mobile applications require constant adaptation to their changing environments, or contexts. Technological advancements have increased the pervasiveness of mobile computing devices such as laptops, handhelds, and embedded sensors. The sheer amount of context information available for adaptation places a heightened burden on application developers as they must manage and utilize vast amo...

متن کامل

Passive Network Awareness for Adaptive Mobile Applications TR-UTEDGE-2006-002

In pervasive computing, adaptation is essential to applications. However, adaptation requires an up-to-the-minute understanding of the state of the environment, which often comes with a significant added cost in terms of computation and communication. In this paper, we explore possibilities for measuring the degree of mobility in dynamic ubiquitous networks. Existing measures of mobility degree...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006