A Coordination Model for Agents Based on Secure Spaces

Shared space coordination models such as Linda are ill-suited for structuring applications composed of erroneous or insecure components. This paper presents the Secure Object Space model. In this model, a data element can be locked with a key and is only visible to a process that presents a matching key to unlock the element. We give a precise semantics for Secure Object Space operations and discuss an implementation in JAVA for a mobile agent system. An implementation of the semantics that employs encryption is also outlined for use in untrusted environments.

[1]  Martín Abadi,et al.  Secrecy by Typing inSecurity Protocols , 1997, TACS.

[2]  Jan Vitek,et al.  Seal: A Framework for Secure Mobile Computations , 1998, ICCL Workshop: Internet Programming Languages.

[3]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[4]  Jean-Jacques Lévy,et al.  A Calculus of Mobile Agents , 1996, CONCUR.

[5]  Oscar Nierstrasz,et al.  Object-Based Models and Languages for Concurrent Systems , 1994, Lecture Notes in Computer Science.

[6]  Robert Tolksdorf Coordinating Java agents with multiple coordination languages on the Berlinda platform , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  David Gelernter,et al.  Multiple Tuple Spaces in Linda , 1989, PARLE.

[9]  Andreas Polze The Object Space Approach: Decoupled Communication in C++ , 1993, TOOLS.

[10]  G. Erard Boudol Asynchrony and the -calculus (note) , 1992 .

[11]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[12]  Robert Tolksdorf Laura - A Service-Based Coordination Language , 1998, Sci. Comput. Program..

[13]  Nicholas Carriero,et al.  Bauhaus Linda , 1994, ECOOP Workshop.

[14]  Luca Cardelli,et al.  Mobile Ambients , 1998, FoSSaCS.

[15]  Robert Jellinghaus,et al.  Eiffel Linda: an object-oriented Linda dialect , 1990, SIGP.

[16]  Rocco De Nicola,et al.  Coordinating Mobile Agents via Blackboards and Access Rights , 1997, COORDINATION.

[17]  R. Davis,et al.  The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.

[18]  Oscar Nierstrasz,et al.  Object-Based Concurrent Computing , 1991, Lecture Notes in Computer Science.

[19]  Satoshi Matsuoka,et al.  Using tuple space communication in distributed object-oriented languages , 1988, OOPSLA 1988.

[20]  David L. Tennenhouse,et al.  Active networks (abstract) , 1996, OSDI '96.

[21]  Jan Vitek,et al.  Designing JAVASEAL or How to Make JAVA Safe for Agents , 1998 .

[22]  Jan Vitek,et al.  A Calculus of Secure Mobile Computations ( Preliminary Report ) , 1998 .

[23]  James M. Purtilo,et al.  Reconfiguration of hierarchical tuple-spaces: experiments with Linda-Polylith , 1993 .

[24]  Paolo Ciancarini,et al.  Jada - Coordination and Communication for Java Agents , 1996, Mobile Object Systems.

[25]  Stefan Covaci,et al.  Active Networks , 1999 .

[26]  Luca Cardelli,et al.  Abstractions for Mobile Computation , 1999, Secure Internet Programming.

[27]  Davide Sangiorgi,et al.  On Bisimulations for the Asynchronous pi-Calculus , 1996, Theor. Comput. Sci..

[28]  Martín Abadi,et al.  Secrecy by typing in security protocols , 1999, JACM.

[29]  Mario Tokoro,et al.  On Asynchronous Communication Semantics , 1991, Object-Based Concurrent Computing.

[30]  Laurent Dami,et al.  Type inference and subtyping for higher-order generative communication , 1996 .

[31]  Jean-Henry Morin,et al.  HyperNews: a MEDIA application for the commercialization of an electronic newspaper , 1998, SAC '98.

[32]  Stephen M. Matyas,et al.  The data encryption standard , 1997, Inf. Secur. Tech. Rep..