Abstract
Aglets are Java-based mobile agents developed at IBM’s Tokyo Research Laboratory. This article describes a security model for the aglets development environment that supports flexible architectural definition of security policies.
© 1997 IEEE. Reprinted, with permission, from IEEE INTERNET COMPUTING, Vol. 1, No. 4: JULY–AUGUST 1997, pp. 68–77
Since collaborating on this article, Danny B. Lange has joined General Magic, Inc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
J.J. Ordille. When agents roam, who can you trust?. Proc. First Conf. on Emerging Technologies and Applications in Communications (etaCOM), http://www.etacom.org/, May 1996.
W.M. Farmer, J.D. Guttman, and V. Swarup. Security for Mobile Agents: Issues and Requirements. Proc. 19th National Information Systems Security Conference (NISSC 96), 1996, pp. 591–597.
R.S. Gray. Agent Tcl: A flexible and secure mobile-agent system. In M. Diekhans and M. Roseman, editors, Fourth Annual Tcl/Tk Workshop (TCL 96), 1996, pp. 9–23.
J. Tardo and L. Valente. Mobile Agent Security and Telescript. Proc. IEEE CompCon 96, IEEE Computer Society Press, Los Alamitos, Calif., 1996.
D.B. Lange and M. Oshima. Java Agent API: Programming and Deploying Aglets with Java. to be published by Addision-Wesley, Fall 1997; a working draft “Programming Mobile Agents in Java” is available at http://www.trl.ibm.co.jp/aglets/aglet-book/index.html.
B. Sommers, Agents: Not Just for Bond Anymore. JavaWorld, http://www.javaworld.com/javaworld/jw-04-1997/jw-04-agents.html, April 1997.
B. Venners. The Architecture of Aglets JavaWorld, http://www.javaworld.com/javaworld/jw-04-1997/jw-04-hood.html, April 1997.
B. Venners. “Solve Real Problems with Aglets, a Type of Mobile Agent. JavaWorld, http://www.javaworld.com/javaworld/jw-05-1997/jw-05-hood.html, May 1997.
D.B. Lange. Java Aglet Application Programming Interface (J-AAPI). White paper-draft no. 2, http://www.trl.ibm.co.jp/aglets/JAAPI-whitepaper.html.
D. Chess et al. Itinerant Agents for Mobile Computing. IEEE Personal Communications, Vol. 2, No. 5, Oct. 1995, pp. 34–49.
D. Chess. Things that Go Bump in the Net. http://www.research.ibm.com/massive/bump.html, 1995.
H. Peine and T. Stolpmann. The Architecture of the Ara Platform for Mobile Agents. Proc. First International Workshop on Mobile Agents (MA’97), 1997, Lecture Notes in Computer Science No. 1219, Springer, pp. 50–61.
C. Thirunavukkarasu, T. Finin, and J. Mayfield. Secret Agents-A Security Architecture for the KQML Agent Communication Lanaguage. Proc. Intelligent Information Agents Workshop held in conjunktion with Fourth Int’l Conf. Information and Knowledge Management CIKM 95, Baltimore, Dec. 1995.
L. Gong. New Security Architectural Directions for Java. Proc. IEEE CompCon 97, IEEE Computer Society Press, Los Alamitos, Calif., 1997, pp. 97–102.
DARPA Workshop on Foundations for Secure Mobile Code. http://www.cs.nps.navy.mil/research/languages/wkshp.html, Monterey, Calif., 26–28 March 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Karjoth, G., Lange, D.B., Oshima, M. (1998). A Security Model for Aglets. In: Vigna, G. (eds) Mobile Agents and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68671-1_10
Download citation
DOI: https://doi.org/10.1007/3-540-68671-1_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64792-8
Online ISBN: 978-3-540-68671-2
eBook Packages: Springer Book Archive