Advertisement

Mobile Agents and Security

  • Giovanni Vigna

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1419)

Table of contents

  1. Front Matter
    Pages I-X
  2. Foundations

    1. David M. Chess
      Pages 1-14
    2. James Riordan, Bruce Schneier
      Pages 15-24
    3. Dennis Volpano, Geoffrey Smith
      Pages 25-43
    4. Tomas Sander, Christian F. Tschudin
      Pages 44-60
  3. Security Mechanisms

    1. George C. Necula, Peter Lee
      Pages 61-91
    2. Shimshon Berkovits, Joshua D. Guttman, Vipin Swarup
      Pages 114-136
    3. Giovanni Vigna
      Pages 137-153
  4. Mobile Code Systems

    1. Robert S. Gray, David Kotz, George Cybenko, Daniela Rus
      Pages 154-187
    2. Günter Karjoth, Danny B. Lange, Mitsuru Oshima
      Pages 188-205
    3. Li Gong, Roland Schemers
      Pages 206-216
  5. Active Content and Security

    1. John K. Ousterhout, Jacob Y. Levy, Brent B. Welch
      Pages 217-234
    2. Flavio De Paoli, Andre L. Dos Santos, Richard A. Kemmerer
      Pages 235-256
  6. Back Matter
    Pages 257-257

About this book

Introduction

New paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a \go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.

Keywords

Cryptography Host Mobile Agents Mobile Code Systems Protection agents authentication computer control distributed systems electronic commerce technology time

Editors and affiliations

  • Giovanni Vigna
    • 1
  1. 1.Computer Science DepartmentUniversity of CaliforniaSanta BarbaraUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-68671-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-64792-8
  • Online ISBN 978-3-540-68671-2
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site