skip to main content
article
Free Access

Mobile agent security based on payment

Authors Info & Claims
Published:01 October 2000Publication History
Skip Abstract Section

Abstract

Mobile agents are autonomous entities that handle tasks for their owner. Agents act on their own by reacting to changes and by planning their course of action. These agents can move from one server to another. In the future, agents will also be supplied with real money in some form to pay for resources or services.In this paper we discuss a dynamic security architecture, in which permissions are assigned in exchange for information (money). The decision as to which permissions are available, as well as how much they cost, is based on the source of the code, the owner/user of the code and what other information the agent is willing (or able) to provide.We discuss the advantages and limitations of assessing permissions in monetary terms, rather than binary granting or denial of permissions according to pre-set classes. A test-framework has been implemented using Java.

References

  1. {Acharya97} Anurag Acharya, Guy Edjlali: History-based Access Control for Mobile Code. Technical report TRCS97-25 (ACM-CCCS-98)]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. {Aglets} IBM Research Lab: Aglets Homepage http://www.trl.ibm.co.jp/aglets (7.10.1999)]]Google ScholarGoogle Scholar
  3. {Bredin98} Jonathan Bredin, David Kotz, Daniela Rus: Market-based Resource Control for Mobile Agents. In: Proceedings of the Second International Conference on Autonomous Agents. ACM Press 1998]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. {Garfinkel97} Simson Garfinkel, Gene Spafford: Web Security & Commerce. Sebastopol: O'Reilly 1998]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. {Gosling96} James Gosling, Bill Joy, Guy Steel: The Java Language Specification. Addison-Wesley, 1996]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. {Jsec} J. Steven Fritzinger, Marianne Mueller: Java Security. http://java.sun.com/products/jdk/1.2/docs/guide/security/spec/security-spec.doc.html (12.19.99)]]Google ScholarGoogle Scholar
  7. {Kotz99} David Kotz, Robert S. Gray: Mobile Agents and the Future of the Internet. Operating Systems Review 3/1999, 7-13]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. {Kun00} Yang Kun, Guo Xin, Liu Dayou: Security in Mobile Agent System: Problems and Approaches. Operating Systems Review 1/2000, 21-28]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. {Sanders98} Tomas Sanders, Christian F. Tschudin: Protecting Mobile Agents Against Malicious Hosts. In: G. Vigna (Ed.) Mobile Agents and Security. Berlin: Springer 1998 (Lecture Notes in computer science; Vol. 1419)]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. {Tschudin99} Christian F. Tschudin: Mobile Agent Security. In: Matthias Klusch (Ed.): Intelligent Information Agents. Agent-Based Information Discovery and Management on the Internet. Berlin: Springer 1999]]Google ScholarGoogle Scholar
  11. {Vigna98} Giovanni Vigna (Ed.): Mobile Agents and Security. Berlin: Springer 1998 (Lecture notes in computer science; Vol. 1419)]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. {Yemini98} Y. Yemini, A. Dailianas, D. Florissi, G. Huberman: MarketNet: Market-Based Protection of Information Systems. In: Proceedings of the First International Conference on Information and Computation Economies. ACM Press 1998]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. {Zhou99} Jianying Zhou: Achieving Fair Non-repudiation in Electronic Transactions. Journal of Network and Computer Applications. Academic Press (to appear)]]Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGOPS Operating Systems Review
    ACM SIGOPS Operating Systems Review  Volume 34, Issue 4
    October 2000
    90 pages
    ISSN:0163-5980
    DOI:10.1145/506106
    Issue’s Table of Contents

    Copyright © 2000 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 October 2000

    Check for updates

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader