Using Interfaces to Specify Access Rights

  • J. Hulaas
  • A. Villazón
  • J. Harms
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1603)

Abstract

Mobile agents are usually expected to execute in open environments. This openness implies that they should be able to dynamically learn how to interact with other agents and services which were not known at development time. The interlocutors therefore have to publish enough information about their functionality, while at the same time they have to restrict access rights in order to preserve their integrity. We describe in this paper a messenger-based framework which proposes run-time generated interfaces to address this duality.

Keywords

Mobile Agent Authentication Scheme Object Management Group Resident Agent Multiple Interface 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    J. Vitek, M. Serrano and D. Thanos, Security and Communication in Mobile Object Systems, in Mobile Object Systems: Towards the Programmable Internet, Second International Workshop, MOS’96, Linz, Austria, Selected Presentations and Invited Papers, J. Vitek and C. Tschudin (eds), LNCS vol. 1222, July 1996.Google Scholar
  2. 2.
    C. F. Tschudin, An Introduction to the MØ Messenger Language, Technical Report 86, (Cahier du CUI), University of Geneva, 1994.Google Scholar
  3. 3.
    J. Gosling and H. McGilton. The Java Language Environment. A White Paper. Sun Microsystems, May 1995.Google Scholar
  4. 4.
    M. Muhugusa. Distributed Services in a Messenger Environment: The Case of Distributed Shared-Memory. Ph.D. Thesis no 2903, University of Geneva, 1997.Google Scholar
  5. 5.
    J. G. Steiner, B. Clifford Neuman, and J.I. Schiller, Kerberos: An Authentication Service for Open Network Systems, In Proceedings of the Winter 1988 Usenix Conference, February 1988.Google Scholar
  6. 6.
    N. Brown and C. Kindel, Distributed Component Object Model Protocol-DCOM/1.0, Internet draft, January 1998, http://www.microsoft.com/oledev/olecom/draft-brown-dcom-vl-spec-02.txt
  7. 7.
    CAE Specification, X/Open DCE: Remote Procedure Call, X/Open Company Limited, X/Open Document Number C309. ISBN 1-85912-041-5, Reading, Berkshire, UK, 1994.Google Scholar
  8. 8.
    Object Management Group, The Common Object Request Broker: Architecture and Specification (Revision 2.0), Object Management Group, Framingham, Mass., 1995.Google Scholar
  9. 9.
    Object Management Group, Multiple Interfaces and Composition, work in progress, April 1998, Web information page: http://www.omg.org/library/schedule/Multiple-Interfaces_and_Composi-tion.htm
  10. 10.
    Object Management Group, The Mobile Agents Facility, work in progress, April 1998, Web information page: http://www.omg.org/library/schedule/Mobile.Agents_Facility_RFP.htm
  11. 11.
    A. Acharya, M. Ranganathan, J. Saltz, Sumatra: A Language for Resource-Aware Mobile Programs, in Mobile Object Systems: Towards the Programmable Internet, Second International Workshop, MOS’96, Linz, Austria, Selected Presentations and Invited Papers, J. Vitek and C. Tschudin (eds), LNCS vol. 1222, July 1996.Google Scholar
  12. 12.
    C. F. Tschudin, The Messenger Environment MØ-A Condensed Description, in Mobile Object Systems: Towards the Programmable Internet, Second International Workshop, MOS’96, Linz, Austria, Selected Presentations and Invited Papers, J. Vitek and C. Tschudin (eds), LNCS vol. 1222, July 1996.Google Scholar
  13. 13.
    C. F. Tschudin, Open Resource Allocation, First International Workshop on Mobile Agents (MA’97), Berlin, Germany, April 1997.Google Scholar
  14. 14.
    R. Gray, Agent TCL: A Flexible and Secure Mobile-Agent System, in Proceedings of the fourth annual Tc1/Tk Workshop (TCL 96), July 1996.Google Scholar
  15. 15.
    J. E. White, Telescript Technology: The Foundation for the Electronic Marketplace, General Magic White Paper, General Magic, Inc., 1994.Google Scholar
  16. 16.
    C. F. Tschudin, On the Structuring of Computer Communications, Ph.D. Thesis, University of Geneva, Switzerland, 1993.Google Scholar
  17. 17.
    D. Johansen, R. van Renesse and F. B. Schneider, Operating System Support for Mobile Agents, in Proceedings of the 5th IEEE Workshop on Hot Topics in Operating Systems, pages 42–45, Orcas Island, Wash., May 1994. Also available as Technical Report TR94-1468, Department of Computer Science, Cornell University.Google Scholar
  18. 18.
    D. Lange, M. Oshima, G. Karjoth and K. Kosaka, Aglets: Programming Mobile Agents in Java, in 1st International Conference on Worldwide Computing and its Applications (WWCA’97), T. Masuda, Y. Masunaga and M. Tsukamoto, Eds, LNCS vol. 1274, Springer, Berlin, Germany, pp. 253–266, 1997.Google Scholar
  19. 19.
    Y. Aridor, D. Lange, Agent Design Patterns: Elements of Agent Application Design. Second International Conference on Autonomous Agents (Agents’98). Minneapolis/St. Paul, May 10–13, 1998.Google Scholar
  20. 20.
    Ian Welch and Robert Stroud, Dynamic Adaptation of the Security Properties of Applications and Components., ECOOP Workshop on Distributed Object Security, Brussels, Belgium, July 1998.Google Scholar
  21. 21.
    O. Holder and I. Ben-Shaul, A Reflective Model of Mobile Software Objects, in Proceedings of the 17th IEEE International Conference on Distributed Computing Systems (ICDCS’97), Baltimore, Maryland, USA, May 27–30 1997.Google Scholar
  22. 22.
    F. B. Schneider, Towards Fault-tolerant and Secure Agentry, Invited paper, 11th International Workshop on Distributed Algorithms, Saarbrcken, Germany, Sept. 1997.Google Scholar
  23. 23.
    T. Sander and C. F. Tschudin, Towards Mobile Cryptography, In proceedings of Security & Privacy’98, May, 1998.Google Scholar
  24. 24.
    G. Kiczales, J. des Rivières and D. G. Bobrow, The Art of the Metaobject Protocol, MIT Press, 1991.Google Scholar
  25. 25.
    T. von Eicken, J-kernel a capability based operating system for Java, In Secure Internet Programming, Lecture Notes in Computer Science, Springer-Verlag Inc., New York, NY, USA, 1999.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • J. Hulaas
    • 1
  • A. Villazón
    • 1
  • J. Harms
    • 1
  1. 1.Centre Universitaire d’InformatiqueUniversity of GenevaGenève 4Switzerland

Personalised recommendations