Skip to main content

Adaptive Access Control in Coordination-Based Mobile Agent Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3390))

Abstract

The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the environment requires devices to interact opportunistically when resources are available. Such interactions occur unpredictably as device users have no advance knowledge of others they will encounter. The openness of these environments also requires users to protect themselves and their data from unwanted interactions while maintaining desired, yet unscripted, coordination. As the ubiquity of communicating mobile devices increases, the number of applications supported by the network grows drastically and managing access control is crucial to such systems. Application agents must directly manipulate and examine access policies because these networks are often decoupled from a fixed infrastructure, rendering reliance on centralized servers for authentication and access policies impractical. In this paper, we explore context-aware access control policies tailored to the needs of agent coordination in open environments that exhibit mobility. We propose and evaluate novel constructs to support such policies, especially in the presence of large numbers of highly dynamic application agents.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming Languages and Systems 7, 80–112 (1985)

    Article  MATH  Google Scholar 

  2. Kaufman, J., Lehman, T.: OptimalGrid: The almaden SmartGrid project: Autonomous optimization of distributed computing on the grid. IEEE Task Force on Cluster Computing 4 (2003)

    Google Scholar 

  3. Wyckoff, P., McLaughry, S., Lehman, T., Ford, D.: TSpaces. IBM Systems Journal 37 (1998)

    Google Scholar 

  4. Freeman, E., Hupfer, S., Arnold, K.: JavaSpaces Principles, Patterns, and Practice. Addison-Wesley, Reading (1999)

    Google Scholar 

  5. Murphy, A.L., Picco, G.P., Roman, G.C.: Lime: A middleware for physical and logical mobility. In: Proceedings of the 21st International Conference on Distributed Computing Systems, pp. 524–533 (2001)

    Google Scholar 

  6. Julien, C., Roman, G.C.: Egocentric context-aware programming in ad hoc mobile environments. In: Proceedings of the 10th International Symposium on the Foundations of Software Engineering (2002)

    Google Scholar 

  7. Cabri, G., Leonardi, L., Zambonelli, F.: MARS: A programmable coordination architecture for mobile agents. Internet Computing 4, 26–35 (2000)

    Article  Google Scholar 

  8. Moore, J.: Mobile code security techniques. Technical Report MIS-CIS-98-28, University of Pennsylvania (1998)

    Google Scholar 

  9. White, J.: Telescript technology: The foundation for the electronic marketplace. General Magic White Paper, General Magic, Inc. (1994)

    Google Scholar 

  10. Gray, R.S., Kotz, D., Cybenko, G., Rus, D.: D’Agents: Security in a multiple-language, mobile-agent system. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  11. Gray, R.: Agent tcl: A flexible and secure mobile-agent system. In: Proceedings of the 4th Annual Tcl/Tk Workshop (1996)

    Google Scholar 

  12. Necula, G.: Proof-carrying code. In: Proceedings of the Symposium on Principles of Programming Languages (1997)

    Google Scholar 

  13. Sander, T., Tschudin, C.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Borselius, N., Mitchell, C.J., Wilson, A.: Undetachable threshold signatures. In: Cryptography and Coding—Proceedings of the 8th IMA International Conference. LNCS, vol. 2360, pp. 239–244. Springer, Heidelberg (2001)

    Google Scholar 

  15. Papadimitratos, P., Haas, Z.: Secure data transmission in mobile ad hoc networks. In: Proceedings of the 2003 ACM Workshop on Wireless Security, pp. 41–50 (2003)

    Google Scholar 

  16. National Center for Supercomputing Applications, Integrated Decision Technologies Group: SAMCat: A securable active metadata catalogue (2002)

    Google Scholar 

  17. Byrd, G., Gong, F., Sargor, C., Smith, T.: Yalta: A secure collaborative space for dynamic coalitions. In: IEEE 2nd SMC Information Assurance Workshop (2001)

    Google Scholar 

  18. Cremonini, M., Omicini, A., Zambonelli, F.: Coordination and access control in open distributed agent systems: the TuCSoN approach. In: Porto, A., Roman, G.-C. (eds.) COORDINATION 2000. LNCS, vol. 1906, pp. 99–114. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  19. Bryce, C., Oriol, M., Vitek, J.: A coordination model for agents based on secure spaces. In: Ciancarini, P., Wolf, A. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 4–20. Springer, Heidelberg (2008)

    Google Scholar 

  20. Handorean, R., Roman, G.C.: Secure servise provision in ad hoc networks. In: Proceedings of the 1st International Conference on Service Oriented Computing (2003)

    Google Scholar 

  21. Minsky, N., Minsky, Y., Ungureanu, V.: Safe tuplespace-based coordination in multi agent systems. Journal of Applied Artificial Intelligence 15 (2001)

    Google Scholar 

  22. Kang, P., Borcea, C., Xu, G., Saxena, A., Kremer, U., Iftode, L.: Smart messages: A distributed computing platform for networks of embedded systems. The Computer Journal Special Issue on Mobile and Pervasive Computing (to appear)

    Google Scholar 

  23. Keoh, S.L., Lupu, E.: Towards flexible credential verification in mobile ad hoc networks. In: Proceedings of the ACM Workshop on Principles of Mobile Computing, pp. 58–65 (2002)

    Google Scholar 

  24. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 42–51 (2003)

    Google Scholar 

  25. Weimerskirch, A., Thonet, G.: A distributed light-weight authentication model for ad hoc networks. In: Proceedings of the 4th International Conference on Information Security and Cryptology, pp. 341–354 (2001)

    Google Scholar 

  26. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad hoc wireless networks. In: Network and Distributed System Security Symposium (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Julien, C., Payton, J., Roman, GC. (2005). Adaptive Access Control in Coordination-Based Mobile Agent Systems. In: Choren, R., Garcia, A., Lucena, C., Romanovsky, A. (eds) Software Engineering for Multi-Agent Systems III. SELMAS 2004. Lecture Notes in Computer Science, vol 3390. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31846-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31846-0_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24843-9

  • Online ISBN: 978-3-540-31846-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics