Protection scheme for mobile agents on Java

D. Hagimont, L. Ismail

Research output: Contribution to conferencePaperpeer-review

12 Citations (Scopus)

Abstract

This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities that can be exchanged between mutually suspicious agents. Each agent defines the access control rules that must be enforced when interacting with other agents. An important advantage of the proposed scheme is that the definition of the protection policy of an agent (i.e. how access rights are granted to other agents) is completely separated from the application code of that agent. It is described in an extended Interface Definition Language (IDL) at the interface level, thus enforcing modularity and ease of expression. A prototype has been implemented and experiments with simple agent-based applications have shown the feasibility and the advantage of this method.

Original languageEnglish
Pages215-222
Number of pages8
Publication statusPublished - 1997
Externally publishedYes
EventProceedings of the 1997 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom'97 - Budapest, Hung
Duration: Sept 26 1997Sept 30 1997

Conference

ConferenceProceedings of the 1997 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom'97
CityBudapest, Hung
Period9/26/979/30/97

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Protection scheme for mobile agents on Java'. Together they form a unique fingerprint.

Cite this