Ajanta - A System for Mobile Agent Programming

This paper gives an overview of Ajanta, a Java-based system for mobile agent programming. We discuss the Ajanta architecture, and elaborate on the mechanisms used to provide object mobility, and secure execution of mobile agents in connned protection domains. The agent programming environment is deened, in terms of a set of primitive operations. A proxy-based ne-grained access control mechanism for application-deened resources is described. We show how it can be adapted to provide secure inter-agent communication. We also describe a scheme for agent migration control that we have developed, based on the composition of some fundamental migration patterns. These patterns encapsulate the abstract notion of agent mobility, and incorporate some failure recovery mechanisms.

[1]  Li Gong,et al.  A secure identity-based capability system , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[2]  B. Clifford Neuman,et al.  Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[3]  Liwu Li,et al.  The Java Language , 1998 .

[4]  Daniel M. Zimmerman,et al.  benefits and drawbacks of current Java mobile agent systems , 1997 .

[5]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[6]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[7]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[8]  Holger Peine,et al.  The Architecture of the Ara Platform for Mobile Agents , 1999, Mobile Agents.

[9]  Marc Shapiro,et al.  Structure and Encapsulation in Distributed Systems: The Proxy Principle , 1986, ICDCS.

[10]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[11]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.

[12]  Luís Valente,et al.  Mobile agent security and Telescript , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.

[13]  Andrew P. Black,et al.  Fine-grained mobility in the Emerald system , 1987, TOCS.

[14]  Joel H. Saltz,et al.  Network-aware mobile programs , 1997 .

[15]  Karen R. Sollins,et al.  Functional Requirements for Uniform Resource Names , 1994, RFC.

[16]  Danny B. Lange,et al.  Agent design patterns: elements of agent application design , 1998, AGENTS '98.

[17]  G. Glass ObjectSpace Voyager core package technical overview , 1999 .

[18]  Daniel Hagimont,et al.  A protection scheme for mobile agents on Java , 1997, MobiCom '97.