Secure Mobile Agent Deployment and Communication Towards Autonomous Semantic Grid

  • U. Topaloglu
  • C. Bayrak
  • N. Kanaskar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3825)


As the information technology rapidly expands (regardless of the technology area) collaboration, information sharing and distributed computing become inevitable phenomena (i.e. e-commerce, e-health, e-science etc.) [1]. Since the complexity is a driving force behind the enhancements, new network-centric infrastructures and solutions are proposed to address the problem. Grid is an example solution that handles the situation in a cost-effective and efficient manner. There are available grid based infrastructures to solve scientific (or other) type of applications which need harmony among distributed hardware, software resources and human users. To achieve better usage of resources in a secure and intelligent way, scalable, reliable, and dynamic infrastructures are current requirements. Based on the current trends, we propose a secure, dynamic, and intelligent resource management and access method employing mobile agents along with the grid infrastructure.


Mobile Agent Virtual Organization Simple Object Access Protocol Cipher Text Virtual Cluster 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    von Laszewski, G., Gawor, J., Lane, P., Rehn, N., Russell, M.l.: Features of the Java Commodity Grid Kit. Concurrency and Computation: Practice and Experience 14(13-15), 1045–1055 (2002)CrossRefMATHGoogle Scholar
  2. 2.
    Topaloglu, U., Bayrak, C.: Polymorphic Compression. In: The 20th International Symposium on Computer and Information Sciences, October 26-28, 2005, Istanbul, Turkey (2005)Google Scholar
  3. 3.
    Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of Grid Enabling Scalable Virtual Organizations. Intl. J. Supercomputer Applications (2001)Google Scholar
  4. 4.
    Baker, M., Buyya, R., Laforenza, D.: Grids and Grid technologies for wide-area distributed computing. Softw., Pract. Exper. 32(15), 1437–1466 (2002)CrossRefMATHGoogle Scholar
  5. 5.
    Foster, I., Kesselman, C., Nick, J.M., Tuecke, S.: The Physiology of the Grid, An Open Grid Services Architecture for Distributed Systems Integration, Tech. report, Glous Project,
  6. 6.
    Nagaratnam, N., et al.: The Security Architecture for Open Grid Services,
  7. 7.
    Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: 5th ACM Conference on Computer and Communications Security Conference, pp. 83–92 (1998)Google Scholar
  8. 8.
    Chase, J., Grit, L., Irwin, D., Moore, J., Sprenkle, S.: Dynamic Virtual Clusters in a Grid Site Manager. In: 12th International Symposium on High Performance Distributed Computing, HPDC-12 (2003) (accepted)Google Scholar
  9. 9.
    Keahey, K., Foster, I., Freeman, T., Zhang, X., Galron, D.: Virtual Workspaces in the Grid. In: Europar 2005, Pisa, Italy (August 2005)Google Scholar
  10. 10.
    Sapuntzakis, C., Brumley, D., Chandra, R., Zeldovich, N., Chow, J., Lam, M.S., Rosenblum, M.: Virtual Appliances for Deploying and Maintaining Software. In: Proceedings of the 17th Large Installation Systems Administration Conference, LISA 2003 (2003)Google Scholar
  11. 11.
    Goble, C., De Roure, D.: The Semantic Grid: Myth Busting and Bridge Building. In: Proceedings of the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, Spain (2004)Google Scholar
  12. 12.
    Endo, H., Noto, M., Toyoshima, H.: Quantitative Evaluation of Communication Traffic of Mobile Agents in Distributed Constraint Satisfaction Model. In: International Conference on Systems, Man and Cybernetics, The Hague, The Netherlands, (October 10-13, 2004)Google Scholar
  13. 13.
  14. 14.
    Nwana, H., Lee, L., Jennings, N.: Co-ordination in multi-agent systems. In: Nwana, H.S., Azarmi, N. (eds.) Software Agents and Soft Computing: Towards Enhancing Machine Intelligence. LNCS, vol. 1198. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  15. 15.
    Bayrak, C., Topaloglu, U.: Description of Free Structures with Linear Syntax. In: 7th World Conference in Integrated Design and Process technology, Austin, TX, December 3-6 (2003)Google Scholar
  16. 16.
    Ferber, J.: Multi-Agent systems. Addison-Wesley, Reading (1999)MATHGoogle Scholar
  17. 17.
    Hartline, J.: Mobile Agents: A Survey of Fault Tolerance and Security (unpublished manuscript)Google Scholar
  18. 18.
    Hohl, F.: An Approach to Solve the Problem of Malicious Hosts. Institute of Parallel and Distributed High-Performance Systems (IPVR), Fakultat Informatik Universitat Stuttgart Breitwiesenstr, Netherlands (March 1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • U. Topaloglu
    • 1
  • C. Bayrak
    • 2
  • N. Kanaskar
    • 1
  1. 1.Applied Science DepartmentUniversity of Arkansas at Little RockLittle Rock
  2. 2.Computer Science DepartmentUniversity of Arkansas at Little RockLittle Rock

Personalised recommendations