12 July 2001 Security architecture of the M&M mobile agent framework
Author Affiliations +
Proceedings Volume 4521, Java/Jini Technologies; (2001) https://doi.org/10.1117/12.432992
Event: ITCom 2001: International Symposium on the Convergence of IT and Communications, 2001, Denver, CO, United States
Abstract
In the Mobile Agent programming model, small threads of execution migrate from machine to machine, performing their operations locally. For being able to deploy such a model into real world applications, security is a vital concern. In the M&M project we have developed a system that departures from the traditional platform-based execution model for mobile agents. In M&M there are no agent platforms. Instead there is a component framework that allows the applications to become able of sending and receiving agents by themselves in a straightforward manner. In this paper we examine the security mechanisms available in M&M, and how integration with existing applications is done. One difficult aspect of this work is that all the features must work with the security mechanisms that already exist on the applications. This is so because the components are integrated from within into the applications, which already have security mechanisms in place. Currently, M&M provides features like fine-grain security permissions, encryption of agents and data, certificate distribution using LDAP and cryptographic primitives for agents. For validating the approach and solutions found, we have integrated the framework into several off-the-shelf web servers, having the security mechanisms running, with no problems.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Paulo J. Marques, Paulo J. Marques, Nuno F. Santos, Nuno F. Santos, Luis Silva, Luis Silva, Joao Gabriel Silva, Joao Gabriel Silva, } "Security architecture of the M&M mobile agent framework", Proc. SPIE 4521, Java/Jini Technologies, (12 July 2001); doi: 10.1117/12.432992; https://doi.org/10.1117/12.432992
PROCEEDINGS
12 PAGES


SHARE
RELATED CONTENT

Study of risk based on web software testing
Proceedings of SPIE (March 19 2013)
Considering IIOT and security for the DoD
Proceedings of SPIE (May 11 2016)
Cyber defense through hardware security
Proceedings of SPIE (May 08 2018)
Survey of cyber security issues in smart grids
Proceedings of SPIE (April 28 2010)
Firewall systems: the next generation
Proceedings of SPIE (January 02 1996)

Back to Top