Generative communication in Linda
ACM Transactions on Programming Languages and Systems (TOPLAS)
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
JavaSpaces Principles, Patterns, and Practice
JavaSpaces Principles, Patterns, and Practice
Towards flexible credential verification in mobile ad-hoc networks
Proceedings of the second ACM international workshop on Principles of mobile computing
Egocentric context-aware programming in ad hoc mobile environments
Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering
MARS: A Programmable Coordination Architecture for Mobile Agents
IEEE Internet Computing
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A Coordination Model Agents Based on Secure Spaces
COORDINATION '99 Proceedings of the Third International Conference on Coordination Languages and Models
Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach
COORDINATION '00 Proceedings of the 4th International Conference on Coordination Languages and Models
Service Provision in Ad Hoc Networks
COORDINATION '02 Proceedings of the 5th International Conference on Coordination Models and Languages
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Undetachable Threshold Signatures
Proceedings of the 8th IMA International Conference on Cryptography and Coding
LIME: A Middleware for Physical and Logical Mobility
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
IBM Systems Journal
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
A secure modular mobile agent system
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems
EgoSpaces: Facilitating Rapid Development of Context-Aware Mobile Applications
IEEE Transactions on Software Engineering
Analysis and design of physical and social contexts in multi-agent systems
Software Engineering for Multi-Agent Systems IV
Hi-index | 0.00 |
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the environment requires devices to interact opportunistically when resources are available. Such interactions occur unpredictably as device users have no advance knowledge of others they will encounter. The openness of these environments also requires users to protect themselves and their data from unwanted interactions while maintaining desired, yet unscripted, coordination. As the ubiquity of communicating mobile devices increases, the number of applications supported by the network grows drastically and managing access control is crucial to such systems. Application agents must directly manipulate and examine access policies because these networks are often decoupled from a fixed infrastructure, rendering reliance on centralized servers for authentication and access policies impractical. In this paper, we explore context-aware access control policies tailored to the needs of agent coordination in open environments that exhibit mobility. We propose and evaluate novel constructs to support such policies, especially in the presence of large numbers of highly dynamic application agents.