Promoting the development of secure mobile agent applications

被引:8
作者
Garrigues, Caries [1 ]
Robles, Sergi [2 ]
Borrell, Joan [2 ]
Navarro-Arribas, Guillermo [3 ]
机构
[1] Univ Oberta Catalunya, Barcelona 08018, Spain
[2] Univ Autonoma Barcelona, Dept Engn Informacio & Comunicac, Bellaterra 08193, Spain
[3] CSIC, IIIA, Bellaterra 08193, Spain
关键词
Mobile agents; Software architecture; Aided application development; Specification language;
D O I
10.1016/j.jss.2009.11.001
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile agent security have unblocked this technology, but there is still one important issue to overcome: the complexity of programming applications using these security solutions. Our proposal aims to facilitate and speed up the process of implementing cryptographic protocols, and to allow the reuse of these protocols for the development of secure mobile agents. As a result, the proposed architecture and development environment promote the use of mobile agent technology for the implementation of secure distributed applications. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:959 / 971
页数:13
相关论文
共 33 条
[1]  
AMETLLER J, 2004, AAMAS 04, P362
[2]  
[Anonymous], P 14 ACM S OP SYST P
[3]  
[Anonymous], 1994, THESIS CARNEGIE MELL
[4]  
Bahsoon R, 2006, I C COMP SYST APPLIC, P1142
[5]  
Bellifemine F. L., 2007, Developing MultiAgent Systems with JADE
[6]  
Cucurull J., 2007, DEV MULTIAGENT SYSTE, P115
[7]  
Farmer W.M., 1996, P 19 NAT INF SYST SE, V2, P591
[8]  
GARRIGUES C, 2008, MOBILE AGENT CRYPTOG
[9]   Protecting mobile agents from external replay attacks [J].
Garrigues, Carles ;
Migas, Nikos ;
Buchanan, William ;
Robles, Sergi ;
Borrell, Joan .
JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (02) :197-206
[10]   Securing dynamic itineraries for mobile agent applications [J].
Garrigues, Carles ;
Robles, Sergi ;
Borrell, Joan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2008, 31 (04) :487-508