Abstract
In view of the proliferation and expansion of wide-area open networks such as the intranets and extra-nets, agent technology is attracting greater attention. However, as yet there is well-established and widely used method of developing safe and secure agent systems. In this paper, we propose a methodology that supports the step-by-step development of mobile agent systems while ensuring consideration of security issues. This approach results in a robust infrastructure for practical system development, and by supporting calculation of various costs allows efficiency and security tradeoffs to be objectively evaluated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Shimshon Berkovits, Joshua D. Guttman, and Vipin Swarup, Authentication for mobile agents, in Vigna [8], pp. 114–136.
David M. Chess, Security issues in mobile code systems, in Vigna [8], pp. 1–14.
Fritz Hohl, Time limited blackbox security; protecting mobile agents from malicious hosts, in Vigna [8], pp. 92–113.
George C. Necula and Peter Lee, Safe, untrusted agents using proof-carrying code, in Vigna [8], pp. 61–91.
5.-John K. Ousterhout, Jacob Y. Levy, and Brent B. Welch, The Safe-Tcl security model, in Vigna [8], pp. 217–234.
Tomas Sander and Christian F. Tschudin, Protecting mobile agents against malicious hosts, in Vigna [8], pp. 44–60.
Giovanni Vigna, Cryptographic traces for mobile agents, in Moblie Agents and Security [8], pp. 137–153.
Giovanni Vigna, editor, Moblie Agents and Security, LNCS 1419, Springer Verlag, 1998.
Yariv Aridor and Danny B. Lange, Agent design patterns: Elements of agent application design, in Proceedings of Agents’98, 1998.
Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides, Design Patterns, Addison-Wesley, 1995.
Elizabeth A. Kendall, Chirag V. Pathak, P. V. Murali Krishna, and C. B. Suresh, The layered agent pattern language, in Proceedings of PLoP’97, 1997.
Alberto Silva and José Delgado, The agent pattern: A design pattern for dynamic and distributed applications, in Third European Conference on Pattern Languages of Programming and Computing, 1998.
Tahara, Y., Ohsuga, A. and Honiden, S., Agent System Development Method Based on Agent Patterns, in Proceedings of the 21st International Conference on Software Engineering, acm PRESS, pp.356–367, 1999.
Amund Aarsten, Davide Brugali, and Giuseppe Menga, Patterns for cooperation, in Proceedings of PLOP’96, 1996.
Steven Y. Goldsmith, Shanon V. Spires, and Laurence R. Phillips, Object framework for agent system development, in Proceedings of AAAI-98Workshop on Software Tools for Developing Agents, 1998.
Robert Tolksdorf, Coordination patterns of mobile information agents, in Matthias Klusch and Gerhard Weiß, editors, Cooperative Information Agents II, pp. 246–261, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoshioka, N., Tahara, Y., Ohsuga, A., Honiden, S. (2001). Security for Mobile Agents. In: Ciancarini, P., Wooldridge, M.J. (eds) Agent-Oriented Software Engineering. AOSE 2000. Lecture Notes in Computer Science, vol 1957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44564-1_15
Download citation
DOI: https://doi.org/10.1007/3-540-44564-1_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41594-7
Online ISBN: 978-3-540-44564-7
eBook Packages: Springer Book Archive