Actors: a model of concurrent computation in distributed systems
Actors: a model of concurrent computation in distributed systems
Object mobility in a distributed object-oriented system
Object mobility in a distributed object-oriented system
Extensibility safety and performance in the SPIN operating system
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
JRes: a resource accounting interface for Java
Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Computer security
JFlow: practical mostly-static information flow control
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Commercialization of electronic information
Journal of End User Computing
A sound type system for secure flow analysis
Journal of Computer Security
A lattice model of secure information flow
Communications of the ACM
A note on the confinement problem
Communications of the ACM
The persistent relevance of the local operating system to global applications
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Mole – Concepts of a mobile agent system
World Wide Web
Mobile agents with Java: The Aglet API
World Wide Web
An Actor-Based Architecture for Customizing and Controlling Agent Ensembles
IEEE Intelligent Systems
Mobile Agents and Security
A Calculus for Access Control in Distributed Systems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Exploiting Code Mobility in Decentralized and Flexible Network Management
MA '97 Proceedings of the First International Workshop on Mobile Agents
The Messenger Environment MØ - A Condensed Description
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Mobile Agents: Are They a Good Idea?
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
FoSSaCS '98 Proceedings of the First International Conference on Foundations of Software Science and Computation Structure
Sumatra: A Language for Resource-Aware Mobile Programs
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Disseminating Mobile Agents for Distributed Information Filtering
ASAMA '99 Proceedings of the First International Symposium on Agent Systems and Applications Third International Symposium on Mobile Agents
Agent Tcl: A flexible and secure mobile-agent system
Agent Tcl: A flexible and secure mobile-agent system
Interposition as an Operating System Extension Mechanism
Interposition as an Operating System Extension Mechanism
A secure environment for untrusted helper applications confining the Wily Hacker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
SLIC: an extensibility system for commodity operating systems
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Incommunicado: efficient communication for isolates
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
TACS '01 Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software
Modular Internet Programming with Cells
ECOOP '02 Proceedings of the 16th European Conference on Object-Oriented Programming
Lana: An Approach to Programming Autonomous Systems
ECOOP '02 Proceedings of the 16th European Conference on Object-Oriented Programming
Reasoning about Security in Mobile Ambients
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
Typing Mobility in the Seal Calculus
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
Mobile Code, Internet Security, and E-Commerce
ECOOP '00 Proceedings of the Workshops, Panels, and Posters on Object-Oriented Technology
Access control for mobile agents: The calculus of boxed ambients
ACM Transactions on Programming Languages and Systems (TOPLAS)
ACM Transactions on Programming Languages and Systems (TOPLAS)
Information and Computation
Journal of Functional Programming
Journal of Biomedical Informatics
Information and Computation
SECMAP: a secure mobile agent platform
CEEMAS'05 Proceedings of the 4th international Central and Eastern European conference on Multi-Agent Systems and Applications
A secure communication framework for mobile agents
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
A flexible policy architecture for mobile agents
SOFSEM'06 Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science
Hi-index | 0.00 |
Mobile agents show promise as a new distributed programming paradigm in which locality plays a central role—programs that are able to move closer to their data can overcome limitations of connectivity, latency or bandwidth. Mobility also enables distributed systems to evolve; for instance, the deployment of a new service over a network can be programmed as part of the service itself. Of course, moving programs introduces new challenges. One of these is related to program structure: How much of a computation should be moved? Where are the boundaries between mobile and immobile entities drawn? A second challenge is to provide security guarantees: How can the actions of mobile agent be controlled? And what kinds of security properties can we realistically expect to enforce? We answer these questions within the framework of the JavaSeal mobile agent system kernel. JavaSeal provides several abstractions for constructing agent systems in Java. Our basic building block is the seal which is a nested encapsulated computation fragment with sharply delineated boundaries. Strands are sequential threads of computation bound to a seal. Capsules transfer passive seals and objects over communication channels; Traffic over channels is regulated by portals. We argue that these abstractions are sufficient to program secure mobile agent systems. An electronic commerce application built over our kernel is used as a demonstrator.