Skip to main content

D’Agents: Security in a Multiple-Language, Mobile-Agent System

  • Chapter
  • First Online:
Mobile Agents and Security

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1419))

Abstract

Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we discuss these three issues in the context of D’Agents, a mobile-agent system whose agents can be written in Tcl, Java and Scheme. (D’Agents was formerly known as Agent Tcl.) First we discuss mechanisms existing in D’Agents for protecting an individual machine: (1) cryptographic authentication of the agent’s owner, (2) resource managers that make policy decisions based on the owner’s identity, and (3) secure execution environments for each language that enforce the decisions of the resource managers. Then we discuss our planned market-based approach for protecting machine groups. Finally we consider several (partial) solutions for protecting an agent from a malicious machine.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lubomir F. Bic, Munehiro Fukuda, and Michael B. Dillencourt. Distributed computing using autonomous objects. IEEE Computer, 29(8):55–61, August 1996.

    Article  Google Scholar 

  2. Jonathan Bredin, David Kotz, and Daniela Rus. Marked-based resource control for mobile agents. To appear in the conference Autonomous Agents’ 98, October 1997.

    Google Scholar 

  3. David Chaum and Stefan Brands. “Minting” electronic cash. IEEE Spectrum, 34(2):30–34, February 1997. Special issue on Technology and Electronic Economy.

    Article  Google Scholar 

  4. David Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, and Gene Tsudik. Itinerant agents for mobile computing. IEEE Personal Communications, 2(5):34–49, October 1995.

    Article  Google Scholar 

  5. Michael H. Coen. SodaBot: A software agent environment and construction system. In Yannis Labrou and Tim Finin, editors, Proceedings of the CIKM Workshop on Intelligent Information Agents, Third International Conference on Information and Knowledge Management (CIKM 94), Gaithersburg, Maryland, December 1994.

    Google Scholar 

  6. Gary Cornell and Cay S. Horstmann. Core Java. Sunsoft Press (Prentice Hall), 1997.

    Google Scholar 

  7. Stephanie Forrest, Steven A. Hofmeyr, and Anil Somayaji. Computer immunology. Communications of the ACM, 40(10):88–96, October 1997.

    Article  Google Scholar 

  8. Odyssey: Beta Release 1.0, 1997. Available as part of the Odyssey package at http://www.genmagic.com/agents/.

  9. Robert S. Gray. Agent Tcl: A flexible and secure mobile-agent system. In Proceedings of the 1996 Tcl/Tk Workshop, pages 9–23, July 1996.

    Google Scholar 

  10. David Halls, John Bates, and Jean Bacon. Flexible distributed programming using mobile code. In Proceedings of the Seventh ACM SIGOPS European Workshop, pages 225–231, September 1996.

    Google Scholar 

  11. Melissa Hirschl and David Kotz. AGDB: A debugger for Agent Tcl. Technical Report PCS-TR97-306, Dept. of Computer Science, Dartmouth College, Hanover, NH, February 1997.

    Google Scholar 

  12. Fritz Hohl. Protecting mobile agents with blackbox security. In Proceedings of the 1997 Workshop on Mobile Agents and Security, University of Maryland, October 1997.

    Google Scholar 

  13. Dag Johansen, Robbert van Renesse, and Fred B. Scheidner. Operating system support for mobile agents. In Proceedings of the Fifth IEEE Workshop on Hot Topics in Operating Systems (HTOS), pages 42–45, May 1995.

    Google Scholar 

  14. Günter Karjoth, Danny B. Lange, and Mitsuru Oshima. A security model for Aglets. IEEE Internet Computing, 1(4):68–77, July/August 1997.

    Article  Google Scholar 

  15. Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World. Prentice-Hall, New Jersey, 1995.

    Google Scholar 

  16. Richard Kelsey and Jonathan Rees. A tractable Scheme implementation. Lisp and Symbolic Computation, 7(4), 1995.

    Google Scholar 

  17. Danny B. Lange and Mitsuru Oshima. The Aglet cook-book. 1997. In progress. Selected chapters available at http://www.trl.ibm.co.jp/aglets/aglet-book/index.html.

  18. Jacob Y. Levy and John K. Ousterhout. Safe Tcl toolkit for electronic meeting places. In Proceedings of the First USENIX Workshop on Electronic Commerce, pages 133–135, July 1995.

    Google Scholar 

  19. Mobile Agent Facility Specification (joint submissions). Technical report, Crystaliz, General Magic, GMD FOKUS, Internal Business Machine Corporation, and The Open Group, 1997. Response to OMG’s Common Facility Task Force RFP3. Draft 5 is available at http://www.genmagic.com/agents/MAF/.

  20. Yaron Minsky, Robbert van Renesse, Fred B. Schneider, and Scott D. Stoller. Cryptographic support for fault-tolerant distributed computing. In Proceedings of the Seventh ACM SIGOPS European Workshop, pages 109–114, September 1996.

    Google Scholar 

  21. John K. Ousterhout, Jacob Y. Levy, and Brent B. Welch. The Safe-Tcl security model. Technical report, Sun Microsystems Laboratories, 1997. In progress. Draft available at http://www.sunlabs.com/people/john.ousterhout/safeTcl.html.

  22. Holger Peine and Torsten Stolpmann. The architecture of the Ara platform for mobile agents. In Proceedings of the First International Workshop on Mobile Agents (MA’ 97), volume 1219 of Lecture Notes in Computer Science, Berlin, April 1997. Springer-Verlag.

    Google Scholar 

  23. Daniela Rus, Robert Gray, and David Kotz. Transportable information agents. Journal of Intelligent Information Systems, May 1997. To appear.

    Google Scholar 

  24. Thomas Sander. On cryptographic protection of mobile agents. In Proceedings of the 1997 Workshop on Mobile Agents and Security, University of Maryland, October 1997.

    Google Scholar 

  25. Fred B. Schneider. Security in Tacoma Too. In Proceedings of the 1997 DAGSTUHL Workshop on Mobile Agents, September 1997.

    Google Scholar 

  26. Fred B. Schneider. Towards fault-tolerant and secure agentry. In Proceedings of the 11th International Workshop on Distributed Algortithms, September 1997.

    Google Scholar 

  27. Marvin Sirbu and J. D. Tygar. NetBill: An Internet commerce system optimized for network delivered services. In Proceedings of 40th IEEE Computer Society International Conference (COMPCON 95). IEEE Computer Society Press, March 1995.

    Google Scholar 

  28. Joseph Tardo and Luis Valente. Mobile agent security and Telescript. In Proceedings of the 41th International Conference of the IEEE Computer Society (Comp-Con’ 96), February 1996.

    Google Scholar 

  29. Voyager technical overview. ObjectSpace White Paper, ObjectSpace, 1997.

    Google Scholar 

  30. Peter Wayner. Agents Unleashed: A public domain look at agent technology. AP Professional, Chestnut Hill, Massachusetts, 1995.

    Google Scholar 

  31. James E. White. Telescript technology: The foundation for the electronic marketplace. General Magic White Paper, General Magic, Inc., 1994.

    Google Scholar 

  32. James E. White. Telescript technology: An introduction to the language. General Magic White Paper, General Magic, 1995.

    Google Scholar 

  33. James E. White. Telescript technology: Scenes from the electronic marketplace. General Magic White Paper, General Magic, 1995.

    Google Scholar 

  34. James E. White. Telescript technology: Mobile agents. 1996.

    Google Scholar 

  35. D. Wong, N. Paciorek, T. Walsh, J. DiCelie, M. Young, and B. Peet. Concordia: An infrastructure for collaborating mobile agents. In Proceedings of the First International Workshop on Mobile Agents (MA’ 97), volume 1219 of Lecture Notes in Computer Science, Berlin, April 1997. Springer-Verlag.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Gray, R.S., Kotz, D., Cybenko, G., Rus, D. (1998). D’Agents: Security in a Multiple-Language, Mobile-Agent System. In: Vigna, G. (eds) Mobile Agents and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68671-1_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-68671-1_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64792-8

  • Online ISBN: 978-3-540-68671-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics