Mobile Agents

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic €32.70 /Month

Buy Now

Price includes VAT (France)

eBook EUR 1,177.00 Price includes VAT (France)

Hardcover Book EUR 1,371.49 Price includes VAT (France)

Tax calculation will be finalised at checkout

Purchases are for personal use only

Similar content being viewed by others

A Survey of Multi-agent Programming Languages and Frameworks

Chapter © 2014

Designing Adaptive Systems Using Teleo-Reactive Agents

Chapter © 2014

A Brief Introduction to Agents

Chapter © 2014

Bibliography

Primary Literature

  1. Baumann J, Hohl F, Rothermel K, Straßer M (1998) Mole – concepts of a mobile agent system. WWW Journal, Special issue on Appl Tech Web Agents (to appear) Google Scholar
  2. Bettini L, De Nicola R (2001) Translating strong mobility into weak mobility. Mobile Agents Google Scholar
  3. Binder W (2001) Design and implementation of the J-SEAL2 mobile agent kernel. In: The 2001 Symposium on Applications and the Internet (SAINT-2001), San Diego, January 2001 Google Scholar
  4. Borenstein NE (1994) E-mail with a mind of its own: The SafeTcl language for enabled mail.In: Proceedings of IFIP International Conference, Barcelona, Spain, 1994 Google Scholar
  5. Bouchenak S (1999) Pickling threads state in the Java system.In: 3rd European Research Seminar on Advances in Distributed Systems (ERSADS’99), Madeira Island, Portugal, April 1999 Google Scholar
  6. Bryce C, Vitek J (1999) The javaseal mobile agent kernel. In: Milojevic D (ed) Proceedings of the 1st International Symposium on Agent Systems and Applications, Third International Symposium on Mobile Agents (ASAMA’99), Palm Springs, 9-13 May 1999. ACM Press, pp 176–189 Google Scholar
  7. Bryce C, Vitek J (2002) The JavaSeal mobile agent kernel.Auton Agents MultiAgent Syst Google Scholar
  8. Cardelli L, Ghelli G (2001) A query language based on the ambient logic. Programming languages and systems. In: 10th European Symposium on Programming, ESOP 2001 Google Scholar
  9. Cardelli L, Gordon AD (1999) Types for mobile ambients. In: Proceedings of the 26th ACM Symposium on Principles of Programming Languages, 1999. pp 79–92 Google Scholar
  10. Cardelli L, Gordon AD (2000) Anytime, anywhere. Modal logics for mobile ambients. In: Proceedings of the 27th ACM Symposium on Principles of Programming Languages, 2000. pp 365–377 Google Scholar
  11. Cardelli L, Gordon AD (2000) Mobile ambients. TCS special issue on coordination. D Le Métayer Google Scholar
  12. Cardelli L, Ghelli G, Gordon AD (2000) Types for the ambient calculus. In: I&C special issue on TCS’2000 Google Scholar
  13. Colusa Software (1995) Omniware: a universal substrate for mobile code. White paper, Colusa Software. http://www.colusa.com
  14. Farmer WM, Guttman JD, Swarup V (1996) Security for mobile agents: Issues and requirements. In: National Information Systems Security Conference. National Institute of Standards and Technology Google Scholar
  15. Fuggetta A, Picco GP, Vigna G (1998) Understanding code mobility. IEEE Trans Softw Eng Google Scholar
  16. Funfrocken S (1998) Transparent migration of Java-based mobile agents: Capturing and reestablishing the state of Java programs. In: Proceedings of the Second International Workshop on Mobile Agents, September 1998. Lecture Notes in Computer Science, no 1477. Springer, Stuttgart, pp 26–37 Google Scholar
  17. Goldberg A (1998) A specification of java loading and bytecode verification. In: Proceedings of the Fifth ACM Conference on Computer and Communications Security, 1998 Google Scholar
  18. Gong L, Mueller M, Prafullchandra H, Schemers R (1997) Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In: Proceedings of the USENIX Symposium on Internet Technologies and Systems, Monterey, California, December 1997 Google Scholar
  19. Grimm R, Bershad BN (1999) Providing policy‐neutral and transparent access control in extensible systems. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146 Google Scholar
  20. Hartel PH, Moreau LAV (2001) Formalizing the safety of Java, the Java Virtual Machine and Java Card. ACM Comput Surv (to appear) Google Scholar
  21. Hohl F (1997) Time limited blackbox security: protecting mobile agents from malicious hosts. Mobile Agent Security. Lecture Notes in Computer Science. Springer, Berlin Google Scholar
  22. Jaeger T (1999) Access control in configurable systems. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146 Google Scholar
  23. Jensen T, Le Metayer D, Thorn T (1998) Security and dynamic class loading in Java: A formalization. In: Proceedings of the 1998 IEEE International Conference on Computer Languages, May 1998, pp 4–15 Google Scholar
  24. Jones MB (1999) Interposition agents: Transparently interposing user code at the system interface. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146 Google Scholar
  25. Lange D, Oshima M (1998) Programming and deploying Java Mobile Agents with aglets.Addison Wesley Google Scholar
  26. Loureiro S (2001) Mobile code protection. Ph D thesis, Sophia Antipolis Google Scholar
  27. Malkhi D, Reiter MK, Rubin AD (1998) Secure execution of Java applets using a remote playground. In: Proc of the 1998 IEEE Symp on Security and Privacy, Oakland, May 1998, pp 40–51 Google Scholar
  28. Necula GC, Lee P (1998) Safe untrusted agents using using proof‐carrying code. In: Vigna G (ed) Special issue on mobile agent security, vol 1419 of Lect.Notes in Computer Science.Springer, pp 61–91 Google Scholar
  29. Ousterhout JK, Levy JY, Welch BB (1997) The Safe-Tcl Security Model. Technical report. Sun Microsystems Laboratories, Mountain View. Online at http://research.sun.com/techrep/1997/abstract-60.html
  30. Puliato B, Riccobene S, Scarpa M (1999) An analytical comparison of the clientsever, Remote evaluation, and Mobile Agents paradigms. In: Proc. ASA/MA’99, pp 278–292, October 1999 Google Scholar
  31. Quitadamo R, Cabri G, Leonardi L (2006) Enabling Java mobile computing on the IBM Jikes Research Virtual Machine. In: The International Conference on the Principles and Practice of Programming in Java 2006 (PPPJ 2006). ACM Press, Mannheim Google Scholar
  32. Roth V (1999) Mutual protection of cooperating agents. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146 Google Scholar
  33. Sander T, Tschudin CF (1998) Protecting Mobile Agents Against Malicious Hosts. In: Vigna D (ed) Mobile Agent and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin Google Scholar
  34. Segal ME (1991) Extending dynamic program updating systems to support distributed systems that communicate via remote evaluation. In: Proc. International Workshop on Configurable Distributed Systems, 1991, pp 188–199 Google Scholar
  35. Sekiguchi T, Masuhara H, Yonezawa A (1999) A simple extension of Java language for controllable transparent migration and its portable implementation. In: Coordination Languages and Models. Lecture Notes in Computer Science, pp 211–226 Google Scholar
  36. Stamos JW (1986) Remote evaluation. Ph D thesis, Massachusetts Institute of Technology.Technical report MIT/LCS/TR-354 Google Scholar
  37. Stamos JW, Gifford DK (1990) Implementing remote evaluation. IEEE Trans Softw Eng 16(7) ArticleGoogle Scholar
  38. Stamos JW, Gifford DK (1990) Remote evaluation.ACM Trans Program Lang Syst 12(4):537–565 ArticleGoogle Scholar
  39. Suri N, Bradshaw JM, Breedy MR, Groth PT, Hill GA, Jeffers R, Mitrovich TR, Pouliot BR, Smith DS (2000) NOMADS: Toward an environment for strong and safe agent mobility. In: Proceedings of Autonomous Agents ’2000, Barcelona, Spain. ACM Press, New York Google Scholar
  40. Suri N, Bradshaw JM, Breedy MR, Groth PT, Hill GA, Jeffers R (2000) Strong mobiling and fine‐grained resource control in NOMADS. Agent Systems, Mobile Agents, and applications. Lecture Notes in Computer Science, vol 1882. Springer, Berlin Google Scholar
  41. Suri N et al (2003) Applying agile computing to support efficient and policy‐controlled sensor information feeds in the army future combat systems environment. In: Proceedings of the U.S. Army 2003 Annual Collaborative Technology Symposium Google Scholar
  42. Suri N, Bradshaw J, Carvalho M, Breedy M, Cowin T, Saavedra R, Kulkarni S (2003) Applying agile computing to support efficient and policy‐controlled sensor information feeds in the army future combat systems environment. In: Proceedings of the Collaborative Technologies Alliance Conference (CTA 2003), College Park Google Scholar
  43. Suri N, Bradshaw J, Carvalho M, Cowin T, Breedy M, Groth P, Saavedra R (2003) Agile computing: Bridging the gap between Grid computing and Ad-hoc Peer-to-Peer resource sharing. In: Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid), 2003 Google Scholar
  44. Tardo J, Valenta L (1996) Mobile agent security and telescript. In: Proceedings of IEEE COMPCON, February 1996 Google Scholar
  45. Truyen E, Robben B, Vanhaute B, Coninx T, Joosen W, Verbaeten P (2000) Portable support for transparent thread migration in Java. In: Proceedings of the Joint Symposium on Agent Systems and Applications / Mobile Agents (ASA/MA), September 2000, pp 29–43 Google Scholar
  46. Tschudin C The messenger environment M0 – A condensed description. In: Vitek J, Tschudin C (eds) Mobile object systems. Lecture Notes in Computer Science, vol 1222. Springer, Berlin Google Scholar
  47. Tschudin C, Lundgren H, Gulbrandsen H (2000) Active routing for Ad Hoc Networks. IEEE Commun Mag Google Scholar
  48. Tschudin CF (1999) Mobile agent security. In: Klusch M (ed) Intelligent information agents. Springer Google Scholar
  49. Vigna J (1998) Cryptographic traces for Mobile Agents. In: Vigna G (ed) Mobile agent security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, pp 137–153 ChapterGoogle Scholar
  50. Vitek J, Castagna G (1999) Seal: A framework for secure mobile computations. In: Bal HE, Belkhouche B, Cardelli L (eds) Internet programming languages. Lecture Notes in Computer Science, vol 1686. Springer Google Scholar
  51. Vogler H, Moschgath M-L, Kunkelmann T (1997) An approach for Mobile Agent Security and fault tolerance using distributed transactions. Darmstadt Univ of Technology, ITO, Proc of ICPADS’97 (to appear) Google Scholar
  52. Volpano D, Smith G (1998) Language issues in mobile program security. In: Vigna G (ed) Mobile agent security. Lecture Notes in Computer Science, no 1419. Springer, pp 25–43 Google Scholar
  53. Von Eicken T, Chang C-C, Czajkowski G, Hawblitzel C (1999) J-Kernel: A capability‐based operating system for Java. Lect Notes Comput Sci 1603:369–394 ArticleGoogle Scholar
  54. Wallach DS (1999) A New approach to mobile code security. Ph D Thesis, Princeton University Google Scholar
  55. Wallach DS, Balfanz D, Dean D, Felten EW (1997) Extensible security architectures for Java. Technical report 546–97, Department of Computer Science, Princeton University Google Scholar
  56. White JE (1997) Telescript. In: Cockayne WR, Zyda M (eds) Mobile agents. Manning Publ, Greenwich, pp 37–57 Google Scholar
  57. White JE (1997) Mobile agents. In: Bradshaw JM (ed) Software agents. AAAI/MIT Press, Cambridge, pp 437–472 Google Scholar
  58. Wilhelm UG, Staamann S, Buttyn L (1999) Introducing trusted third parties to the mobile agent paradigm. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146 Google Scholar
  59. Yee B (1999) A sanctuarity for mobile agents. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146 Google Scholar

Books and Reviews

  1. Barak B et al (2001) On the (im)possibility of obfuscating. In: CRYPTO `01, Santa Barbara, 19–23 August. Lecture Notes in Computer Science, vol 2139. Springer, Berlin, pp 1–18. Google Scholar
  2. Braun P, Rossak W (2004) Mobile Agents: Basic concepts, mobility models, and the Tracy Toolkit. Morgan Kauffman Google Scholar
  3. Cardelli L, Ghelli G, Gordon AD (1999) Mobility types for mobile ambients. In: Wiedermann J, van Emde Boas P, Nielsen M (eds) Automata, languagese and programming. In: 26th International Colloquium, ICALP’99 Proceedings. Lecture Notes in Computer Science, vol 1644.Springer, Berlin Google Scholar
  4. Cardelli L, Ghelli G, Gordon AD (2000) Ambient groups and mobility types. In: van Leeuwen J, Watanabe O, Hagiya M, Mosses PD, Ito T (eds) Theoretical computer science Google Scholar
  5. Carriero N, Gelernter D (1989) Linda in context.Commun ACM 32(4):444–458 ArticleGoogle Scholar
  6. Carvalho M, Breedy M (2002) Supporting flexible data feeds in dynamic sensor grids through mobile agents. In: Proceedings of the 6th IEEE International Conference on Mobile Agents. Springer Google Scholar
  7. Gong L, Schemers R (1998) Signing, sealing, and guarding Java Objects. In: Vigna G (ed) Mobile agent security. Lecture Notes in Computer Science, vol 1420. Springer, Berlin, pp 206–216 ChapterGoogle Scholar
  8. Gray RS (1996) Agent Tcl: A flexible and secure mobile‐agent system. In: Proceedings of the 4th Annual Tcl/Tk Workshop (TCL 96), July 1996, pp 9–23 Google Scholar
  9. Gray R, Kotz D, Cybenko G, Rus D (1998) Security in a multiple‐language mobile‐agent system, In: Vigna G (ed) Lecture Notes in Computer Science: Mobile Agents and Security Google Scholar
  10. McGraw G, Felten EW (1997) Java security: Hostile applets, holes, and antidotes. Wiley Google Scholar
  11. Murphy AL, Picco GP, Roman G-C (2001) Lime: A middleware for physical and logical mobility. In: Proceedings of the 21 st International Conference on Distributed Computing Systems (ICDCS-21), May 2001 Google Scholar
  12. Picco GP, Murphy AL, Roman G-C (1999) Lime: Linda meets mobility. In: Garlan D (ed) Proceedings of the 21 st International Conference on Software Engineering, May 1999 Google Scholar
  13. Tschudin C (1994) An introduction to the M0 messenger system.Technical report 86 (Cahier du CUI), University of Geneva Google Scholar
  14. Volpano D (1996) Provably‐secure programming languages for remote evaluation. ACM Comput Surv 28A(2):electronic Google Scholar

Acknowledgments

Portions of this chapter were initially written for the Information Technology Assessment Consortium(ITAC) at the Institute for Human & Machine Cognition (IHMC) as part of a report entitled Software Agents for the Warfighter, sponsored by NASAand DARPA, and edited by Jeffrey Bradshaw at IHMC.

Author information

Authors and Affiliations

  1. Institute for Human and Machine Cognition, Pensacola, USA Niranjan Suri
  2. Purdue University, West Lafayette, USA Jan Vitek
  1. Niranjan Suri