Skip to main content

A Security Model for Aglets

  • Chapter
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1419))

Abstract

Aglets are Java-based mobile agents developed at IBM’s Tokyo Research Laboratory. This article describes a security model for the aglets development environment that supports flexible architectural definition of security policies.

© 1997 IEEE. Reprinted, with permission, from IEEE INTERNET COMPUTING, Vol. 1, No. 4: JULY–AUGUST 1997, pp. 68–77

Since collaborating on this article, Danny B. Lange has joined General Magic, Inc.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J.J. Ordille. When agents roam, who can you trust?. Proc. First Conf. on Emerging Technologies and Applications in Communications (etaCOM), http://www.etacom.org/, May 1996.

  2. W.M. Farmer, J.D. Guttman, and V. Swarup. Security for Mobile Agents: Issues and Requirements. Proc. 19th National Information Systems Security Conference (NISSC 96), 1996, pp. 591–597.

    Google Scholar 

  3. R.S. Gray. Agent Tcl: A flexible and secure mobile-agent system. In M. Diekhans and M. Roseman, editors, Fourth Annual Tcl/Tk Workshop (TCL 96), 1996, pp. 9–23.

    Google Scholar 

  4. J. Tardo and L. Valente. Mobile Agent Security and Telescript. Proc. IEEE CompCon 96, IEEE Computer Society Press, Los Alamitos, Calif., 1996.

    Google Scholar 

  5. D.B. Lange and M. Oshima. Java Agent API: Programming and Deploying Aglets with Java. to be published by Addision-Wesley, Fall 1997; a working draft “Programming Mobile Agents in Java” is available at http://www.trl.ibm.co.jp/aglets/aglet-book/index.html.

  6. B. Sommers, Agents: Not Just for Bond Anymore. JavaWorld, http://www.javaworld.com/javaworld/jw-04-1997/jw-04-agents.html, April 1997.

  7. B. Venners. The Architecture of Aglets JavaWorld, http://www.javaworld.com/javaworld/jw-04-1997/jw-04-hood.html, April 1997.

  8. B. Venners. “Solve Real Problems with Aglets, a Type of Mobile Agent. JavaWorld, http://www.javaworld.com/javaworld/jw-05-1997/jw-05-hood.html, May 1997.

  9. D.B. Lange. Java Aglet Application Programming Interface (J-AAPI). White paper-draft no. 2, http://www.trl.ibm.co.jp/aglets/JAAPI-whitepaper.html.

  10. D. Chess et al. Itinerant Agents for Mobile Computing. IEEE Personal Communications, Vol. 2, No. 5, Oct. 1995, pp. 34–49.

    Article  Google Scholar 

  11. D. Chess. Things that Go Bump in the Net. http://www.research.ibm.com/massive/bump.html, 1995.

  12. H. Peine and T. Stolpmann. The Architecture of the Ara Platform for Mobile Agents. Proc. First International Workshop on Mobile Agents (MA’97), 1997, Lecture Notes in Computer Science No. 1219, Springer, pp. 50–61.

    Google Scholar 

  13. C. Thirunavukkarasu, T. Finin, and J. Mayfield. Secret Agents-A Security Architecture for the KQML Agent Communication Lanaguage. Proc. Intelligent Information Agents Workshop held in conjunktion with Fourth Int’l Conf. Information and Knowledge Management CIKM 95, Baltimore, Dec. 1995.

    Google Scholar 

  14. L. Gong. New Security Architectural Directions for Java. Proc. IEEE CompCon 97, IEEE Computer Society Press, Los Alamitos, Calif., 1997, pp. 97–102.

    Chapter  Google Scholar 

  15. DARPA Workshop on Foundations for Secure Mobile Code. http://www.cs.nps.navy.mil/research/languages/wkshp.html, Monterey, Calif., 26–28 March 1997.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Karjoth, G., Lange, D.B., Oshima, M. (1998). A Security Model for Aglets. In: Vigna, G. (eds) Mobile Agents and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68671-1_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-68671-1_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64792-8

  • Online ISBN: 978-3-540-68671-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics