Abstract
An instance-oriented security mechanism is proposed to deal with security threats in building a general-purpose mobile agent middleware in Grid environment. The proposed solution imports security instance, which is an encapsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Study shows this mechanism can inject large flexibility and scalability into the security framework, and can avoid the inefficiency and potential damages obscuring in a conventional linear delegation model.
This paper is sponsored by Zhejiang Provincial Natural Science Foundation of China (No. 602032)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cao, J., Jarvis, S.A., Saini, S., Kerbyson, D.J., Nudd, G.R.: ARMS: an Agent-based Resource Management System for Grid Computing. Scientific Programming, Special Issue on Grid Computing 10(2), 135–148 (2002)
Lin Choi Keung, H.N., Cao, J., Spooner, D.P., Jarvis, S.A.: Grid Information Services Using Software Agents. In: Nudd. Proc. 18th Annual UK Performance Engineering Workshop, Glasgow, UK, pp. 187–198 (2002)
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proc. 5th ACM Conference on Computer and Communications Security Conference, pp. 83–92 (1998)
Karnik, N.: Security in Mobile Agent Systems., Ph.D. Dissertation, Department of Computer Science, University of Minnesota (October 1998)
Sander, V., Roy, A.: Advanced Reservation API, GFD-E.5, GGF Scheduling Working Group, Scheduling Working Document 9.4
Schneider, F.B.: Towards Fault-Tolerant and Secure Agentry. In: Proceedings 11th International Workshop on Distributed Algorithms, Saarbucken, Germany (September 1997)
Chander, A., Mitchell, J.C., Shin, I.: Mobile code security by Java bytecode instrumentation. In: DARPA Information Survivability Conference & Exposition (DISCEX II) (June 2001)
Necula, G., Lee, P.: Proof-Carrying Code. In: Proceedings of the 24th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, POPL 1997 (1997)
Wilhelm, U.G., Staamann, S., Buttyà n, L.: Introducing trusted third parties to the mobile agent paradigm. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pp. 471–491. Springer, Heidelberg (1999)
Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security, pp. 44–60. Springer, Heidelberg (1998)
Islam, N., et al.: A Flexible Security System for Using Internet Content. IEEE Software, 52–59 (September 1997)
Wong, H.C., Sycara, K.: Adding Security and Trust to Multi-Agent Systems. In: Proceedings of Autonomous Agents 1999 (Workshop on Deception, Fraud and Trust in Agent Societies), Seattle, Washington, May 1999, pp. 149–161 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ma, T., Li, S. (2004). Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation. In: Li, M., Sun, XH., Deng, Qn., Ni, J. (eds) Grid and Cooperative Computing. GCC 2003. Lecture Notes in Computer Science, vol 3032. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24679-4_153
Download citation
DOI: https://doi.org/10.1007/978-3-540-24679-4_153
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21988-0
Online ISBN: 978-3-540-24679-4
eBook Packages: Springer Book Archive