Concepts and architecture of a security-centric mobile agent server

Mobile software agents are software components that are able to move in a network. They are often considered as an attractive technology in electronic commerce applications. Although security concerns prevail. We describe the architecture and concepts of the SeMoA server-a runtime environment for Java-based mobile agents. Its architecture has a focus on security and easy extendability, and offers a framework for transparent content inspection of agents by means of filters. We implemented filters that handle agent signing and authentication as well as selective encryption of agent contents. Filters are applied transparently such that agents need not be aware of the security services provided by the server.

[1]  Jan Vitek,et al.  The JavaSeal Mobile Agent Kernel , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.

[2]  Volker Roth Scalable and Secure Global Name Services for Mobile Agents , 2000 .

[3]  Volker Roth,et al.  Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.

[4]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[5]  Munindar P. Singh,et al.  Agents on the Web: Mobile Agents , 1997, IEEE Internet Comput..

[6]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[7]  Volker Roth,et al.  An Application of Mobile Agents as Personal Assistents in Electronic Commerce , 2000 .

[8]  Thorsten von Eicken,et al.  JRes: a resource accounting interface for Java , 1998, OOPSLA '98.

[9]  Luo Hong JAVA Security Architecture , 2000 .

[10]  Volker Roth,et al.  Encrypting Java Archives and Its Application to Mobile Agent Security , 2001, AgentLink.

[11]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[12]  Todd Papaioannou,et al.  On the structuring of distributed systems : the argument for mobility , 2000 .

[13]  D. B. Davis,et al.  Sun Microsystems Inc. , 1993 .

[14]  Anand R. Tripathi,et al.  Agent Server Architecture for the Ajanta Mobile-Agent System , 1998 .

[15]  Volker Roth,et al.  Access control and key management for mobile agents , 1998, Comput. Graph..