Abstract
Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we discuss these three issues in the context of D’Agents, a mobile-agent system whose agents can be written in Tcl, Java and Scheme. (D’Agents was formerly known as Agent Tcl.) First we discuss mechanisms existing in D’Agents for protecting an individual machine: (1) cryptographic authentication of the agent’s owner, (2) resource managers that make policy decisions based on the owner’s identity, and (3) secure execution environments for each language that enforce the decisions of the resource managers. Then we discuss our planned market-based approach for protecting machine groups. Finally we consider several (partial) solutions for protecting an agent from a malicious machine.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lubomir F. Bic, Munehiro Fukuda, and Michael B. Dillencourt. Distributed computing using autonomous objects. IEEE Computer, 29(8):55–61, August 1996.
Jonathan Bredin, David Kotz, and Daniela Rus. Marked-based resource control for mobile agents. To appear in the conference Autonomous Agents’ 98, October 1997.
David Chaum and Stefan Brands. “Minting” electronic cash. IEEE Spectrum, 34(2):30–34, February 1997. Special issue on Technology and Electronic Economy.
David Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, and Gene Tsudik. Itinerant agents for mobile computing. IEEE Personal Communications, 2(5):34–49, October 1995.
Michael H. Coen. SodaBot: A software agent environment and construction system. In Yannis Labrou and Tim Finin, editors, Proceedings of the CIKM Workshop on Intelligent Information Agents, Third International Conference on Information and Knowledge Management (CIKM 94), Gaithersburg, Maryland, December 1994.
Gary Cornell and Cay S. Horstmann. Core Java. Sunsoft Press (Prentice Hall), 1997.
Stephanie Forrest, Steven A. Hofmeyr, and Anil Somayaji. Computer immunology. Communications of the ACM, 40(10):88–96, October 1997.
Odyssey: Beta Release 1.0, 1997. Available as part of the Odyssey package at http://www.genmagic.com/agents/.
Robert S. Gray. Agent Tcl: A flexible and secure mobile-agent system. In Proceedings of the 1996 Tcl/Tk Workshop, pages 9–23, July 1996.
David Halls, John Bates, and Jean Bacon. Flexible distributed programming using mobile code. In Proceedings of the Seventh ACM SIGOPS European Workshop, pages 225–231, September 1996.
Melissa Hirschl and David Kotz. AGDB: A debugger for Agent Tcl. Technical Report PCS-TR97-306, Dept. of Computer Science, Dartmouth College, Hanover, NH, February 1997.
Fritz Hohl. Protecting mobile agents with blackbox security. In Proceedings of the 1997 Workshop on Mobile Agents and Security, University of Maryland, October 1997.
Dag Johansen, Robbert van Renesse, and Fred B. Scheidner. Operating system support for mobile agents. In Proceedings of the Fifth IEEE Workshop on Hot Topics in Operating Systems (HTOS), pages 42–45, May 1995.
Günter Karjoth, Danny B. Lange, and Mitsuru Oshima. A security model for Aglets. IEEE Internet Computing, 1(4):68–77, July/August 1997.
Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World. Prentice-Hall, New Jersey, 1995.
Richard Kelsey and Jonathan Rees. A tractable Scheme implementation. Lisp and Symbolic Computation, 7(4), 1995.
Danny B. Lange and Mitsuru Oshima. The Aglet cook-book. 1997. In progress. Selected chapters available at http://www.trl.ibm.co.jp/aglets/aglet-book/index.html.
Jacob Y. Levy and John K. Ousterhout. Safe Tcl toolkit for electronic meeting places. In Proceedings of the First USENIX Workshop on Electronic Commerce, pages 133–135, July 1995.
Mobile Agent Facility Specification (joint submissions). Technical report, Crystaliz, General Magic, GMD FOKUS, Internal Business Machine Corporation, and The Open Group, 1997. Response to OMG’s Common Facility Task Force RFP3. Draft 5 is available at http://www.genmagic.com/agents/MAF/.
Yaron Minsky, Robbert van Renesse, Fred B. Schneider, and Scott D. Stoller. Cryptographic support for fault-tolerant distributed computing. In Proceedings of the Seventh ACM SIGOPS European Workshop, pages 109–114, September 1996.
John K. Ousterhout, Jacob Y. Levy, and Brent B. Welch. The Safe-Tcl security model. Technical report, Sun Microsystems Laboratories, 1997. In progress. Draft available at http://www.sunlabs.com/people/john.ousterhout/safeTcl.html.
Holger Peine and Torsten Stolpmann. The architecture of the Ara platform for mobile agents. In Proceedings of the First International Workshop on Mobile Agents (MA’ 97), volume 1219 of Lecture Notes in Computer Science, Berlin, April 1997. Springer-Verlag.
Daniela Rus, Robert Gray, and David Kotz. Transportable information agents. Journal of Intelligent Information Systems, May 1997. To appear.
Thomas Sander. On cryptographic protection of mobile agents. In Proceedings of the 1997 Workshop on Mobile Agents and Security, University of Maryland, October 1997.
Fred B. Schneider. Security in Tacoma Too. In Proceedings of the 1997 DAGSTUHL Workshop on Mobile Agents, September 1997.
Fred B. Schneider. Towards fault-tolerant and secure agentry. In Proceedings of the 11th International Workshop on Distributed Algortithms, September 1997.
Marvin Sirbu and J. D. Tygar. NetBill: An Internet commerce system optimized for network delivered services. In Proceedings of 40th IEEE Computer Society International Conference (COMPCON 95). IEEE Computer Society Press, March 1995.
Joseph Tardo and Luis Valente. Mobile agent security and Telescript. In Proceedings of the 41th International Conference of the IEEE Computer Society (Comp-Con’ 96), February 1996.
Voyager technical overview. ObjectSpace White Paper, ObjectSpace, 1997.
Peter Wayner. Agents Unleashed: A public domain look at agent technology. AP Professional, Chestnut Hill, Massachusetts, 1995.
James E. White. Telescript technology: The foundation for the electronic marketplace. General Magic White Paper, General Magic, Inc., 1994.
James E. White. Telescript technology: An introduction to the language. General Magic White Paper, General Magic, 1995.
James E. White. Telescript technology: Scenes from the electronic marketplace. General Magic White Paper, General Magic, 1995.
James E. White. Telescript technology: Mobile agents. 1996.
D. Wong, N. Paciorek, T. Walsh, J. DiCelie, M. Young, and B. Peet. Concordia: An infrastructure for collaborating mobile agents. In Proceedings of the First International Workshop on Mobile Agents (MA’ 97), volume 1219 of Lecture Notes in Computer Science, Berlin, April 1997. Springer-Verlag.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Gray, R.S., Kotz, D., Cybenko, G., Rus, D. (1998). D’Agents: Security in a Multiple-Language, Mobile-Agent System. In: Vigna, G. (eds) Mobile Agents and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68671-1_9
Download citation
DOI: https://doi.org/10.1007/3-540-68671-1_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64792-8
Online ISBN: 978-3-540-68671-2
eBook Packages: Springer Book Archive