Itinerant Agents for Mobile Computing

Describes a framework for itinerant agents that can be used to implement secure, remote applications in large, public networks such as the Internet or the IBM Global Network. Itinerant agents are programs, dispatched from a source computer, that roam among a set of networked servers until they accomplish their task. This is an extension to the client/server model in which the client sends a portion of itself to the server for execution. An additional feature of itinerant agents is their ability to migrate from server to server, perhaps seeking one that can help with the user's task or perhaps collecting information from all of them. A major focus of the article is the agent meeting point, an abstraction that supports the interaction of agents with each other and server based resources The article begins with an overview of the operation of an itinerant agent framework and a review of previous work. The authors consider likely applications of itinerant agents and discuss one specific example in detail. They give an architectural description of the structure of itinerant agents, the languages employed to create them, and the execution environments required at the servers; and also a detailed description of how an itinerant agent is processed at a server. Security issues are then discussed and finally they consider the technical advantages of the itinerant agent framework and the services it enables. >

[1]  G. Shering,et al.  The NODAL system for the SPS 1974 , 1974 .

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[5]  Tad Hogg,et al.  Collective behavior of predictive agents , 1990 .

[6]  L. J. Hoffman Rogue programs: viruses, worms and Trojan horses , 1990 .

[7]  Timothy W. Finin,et al.  Enabling Technology for Knowledge Sharing , 1991, AI Mag..

[8]  Timothy W. Finin,et al.  An Overview of KQML: A Knowledge Query and Manipulation Language , 1991 .

[9]  Tad Hogg,et al.  CAN PREDICTIVE AGENTS PREVENT CHAOS , 1992 .

[10]  Peter F. Patel-Schneider,et al.  The DARPA Knowledge Sharing Effort: A Progress Report , 1997, KR.

[11]  M. R. Genesereth,et al.  Knowledge Interchange Format Version 3.0 Reference Manual , 1992, LICS 1992.

[12]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[13]  西 和人,et al.  MIME(Multipurpose Internet Mail Extensions)について , 1993 .

[14]  S. Chokhani Toward a national public key infrastructure , 1994, IEEE Communications Magazine.

[15]  John K. Ousterhout,et al.  Tcl and the Tk Toolkit , 1994 .

[16]  Jeffrey S. Rosenschein and Gilad Zlotkin Rules of Encounter , 1994 .

[17]  Timothy W. Finin,et al.  KQML as an agent communication language , 1994, CIKM '94.

[18]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.