Skip to main content

Secure Dynamic Reconfiguration of Scalable CORBA Systems with Mobile Agents

  • Conference paper
Agent Systems, Mobile Agents, and Applications (ASA 2000, MA 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1882))

Abstract

As various Internet services, e-commerce, and information systems permeate our lives, their continual availability becomes a dominant issue. But continuing software evolution requires system reconfiguration. Running systems must upgrade their components or change their configuration parameters. In addition, Internet services often need to serve thousands or millions of users. This scenario raises three conflicting issues: availability, configurability, and scalability.

We propose the use of mobile reconfiguration agents for the efficient, secure, and scalable dynamic reconfiguration of Internet systems. We describe a CORBA object-oriented framework that supports dynamic reconfiguration and allows customization to different kinds of computing environments ranging from PDAs and embedded systems with limited resources to powerful workstations.

This research is supported by the National Science Foundation, grants 98-70736 and EIA99-72884EQ. Fabio Kon is supported in part by CAPES-Brazil, proc. 1405/95-2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baldi, M., Picco, G.: Evaluating the Tradeoffs of Mobile Code Design Paradigms in Network Management Applications. In: Proc. 20th Int. Conf. Software Engineering, April 1998, pp. 146–155 (1998)

    Google Scholar 

  2. Eppinger, J.L., Mummert, L.B., Spector, A.Z. (eds.): CAMELOT and AVALON: A Distributed Transaction Facility. Morgan Kaufmann Pub, San Francisco (1991)

    Google Scholar 

  3. Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann Publishers, San Mateo (1993)

    MATH  Google Scholar 

  4. Ismail, L., Hagimont, D.: A Performance Evaluation of the Mobile Agent Paradigm. In: Proceedings of OOPSLA 1999, Denver, November 1999, pp. 306–313 (1999)

    Google Scholar 

  5. Jain, P., Schmidt, D.C.: Dynamically Configuring Communication Services with the Service Configuration Pattern. C++ Report 9(6) (June 1997)

    Google Scholar 

  6. Kon, F., Campbell, R., et al.: A Component-Based Architecture for Scalable Distributed Multimedia. In: Proc. 14th ICAST, Naperville, April 1998, pp. 121–135 (1998)

    Google Scholar 

  7. Kon, F., Román, M., et al.: Monitoring, Security, and Dynamic Configuration with the dynamicTAO Reflective ORB. In: Coulson, G., Sventek, J. (eds.) Middleware 2000. LNCS, vol. 1795, pp. 121–143. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Linn, J.: The Generic Security Service Application Program Interface (GSS API). Technical Report Internet RFC 2078, Network Working Group (January 1997)

    Google Scholar 

  9. Necula, G.C., Lee, P.: Safe, Untrusted Agents Using Proof-carrying Code. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 61–91. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Puliafito, A., Riccobene, S., Scarpa, M.: An Analytical Comparison of the Client-Sever, Remote Evaluation, and Mobile Agents Paradigms. In: Proc. ASA/MA 1999, October 1999, pp. 278–292 (1999)

    Google Scholar 

  11. Purtilo, J., Cole, R., Schlichting, R. (eds.): Fourth International Conference on Configurable Distributed Systems. IEEE, Los Alamitos (1998)

    Google Scholar 

  12. Ranganathan, M., Schall, V., Galtier, V., Montgomery, D.: Mobile Streams: A Middleware for Reconfigurable Distributed Scripting. In: Proc. ASA/MA 1999, October 1999, pp. 162–175 (1999)

    Google Scholar 

  13. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)

    Google Scholar 

  14. Silva, F.A., Popescu-Zeletin, R.: An Approach for Providing Mobile Agent Fault Tolerance. In: Proc. Second Int. Workshop on Mobile Agents, September 1998, pp. 14–25 (1998)

    Google Scholar 

  15. Vigna, G. (ed.): Mobile Agents and Security. LNCS, vol. 1419. Springer, Heidelberg (1998)

    Google Scholar 

  16. Vitek, J., Bryce, C.: The JavaSeal Mobile Agent Kernel. In: Proc. ASA/MA 1999, October 1999, pp. 103–116 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kon, F., Gill, B., Anand, M., Campbell, R., Mickunas, M.D. (2000). Secure Dynamic Reconfiguration of Scalable CORBA Systems with Mobile Agents. In: Kotz, D., Mattern, F. (eds) Agent Systems, Mobile Agents, and Applications. ASA MA 2000 2000. Lecture Notes in Computer Science, vol 1882. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45347-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45347-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41052-2

  • Online ISBN: 978-3-540-45347-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics