Enforcement of Communications Policies in Software Agent Systems through Mobile Code

نویسندگان

  • Niranjan Suri
  • Marco M. Carvalho
  • Jeffrey M. Bradshaw
  • Maggie R. Breedy
  • Thomas B. Cowin
  • Paul T. Groth
  • Raul Saavedra
  • Andrzej Uszok
چکیده

This paper introduces the use of mobile agents as the mechanism for policy enforcement in multi-agent multidomain systems. The focus is on the effective application of communication policies in the setup and maintenance of spanning data streams that cross multiple hosts in different domains. We have designed and implemented a mobile agent based framework (FlexFeed) that works in concert with the KAoS framework for policy management.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Autonomic configuration and recovery in a mobile agent-based distributed event monitoring system

In this paper we present a framework for building policy-based autonomic distributed agent systems. The autonomic mechanisms of configuration and recovery are supported through a distributed event processing model and a set of policy enforcement mechanisms embedded in an agent framework. Policies are event-driven rules derived from the system’s functional and non-functional requirements. Agents...

متن کامل

Running Mobile Agent Code over Simulated Inter-networks: an Extra Gear towards Distributed System Evaluation

Mobile Agent (MA) systems are complex software entities whose behavior, performance and effectiveness cannot always be anticipated by the designer. Their evaluation often presents various aspects that require a careful, methodological approach as well as the adoption of suitable tools, needed to identify critical overheads that may impact the overall system performance, stability, validity and ...

متن کامل

Policy Controlled Mobility

The mobility of software components seems an interesting solution for the deployment of web services and applications in the Internet global infrastructure and also in mobile ad-hoc networks. The network infrastructure already supports several forms of code mobility to make possible to dynamically reconfigure bindings between code fragments and locations where they are to be executed. However, ...

متن کامل

Security in Untrusted Code Environments: Missing Pieces of the Puzzle

Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies, component-based security architectures such as Java and .NET still fail to provide several essential f...

متن کامل

A Flexible Policy Architecture for Mobile Agents

Recent advances in distributed computing has lead software agents to be mobile and/or composed of distributed resources. In order to perform certain tasks, mobile agents may require access to resources available on remote systems. Although appealing in terms of system design and extensibility, mobile agents are a security risk and require strong access control. Further, the mobile code environm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003