The JavaSeal Mobile Agent Kernel

JavaSeal is a secure mobile agent kernel that provides a small set of abstractions for constructing agent applications. We describe the design of these abstractions and their implementation. We address the limitations of the Java security model that had to be overcome, and then present a medium-sized e-commerce application that runs over JavaSeal.

[1]  John K. Ousterhout,et al.  The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.

[2]  Luo Hong JAVA Security Architecture , 2000 .

[3]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[4]  Levente Buttyán,et al.  On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.

[5]  Gul Agha,et al.  A actor-based architecture for customizing and controlling agent ensembles , 1999, IEEE Intell. Syst..

[6]  Dan S. Wallach,et al.  Extensible security architectures for Java , 1997, SOSP.

[7]  Li Gong Java Security Architecture (JDK1.2) , 1997 .

[8]  Mike Hibler,et al.  The persistent relevance of the local operating system to global applications , 1996, EW 7.

[9]  Andrew C. Myers,et al.  JFlow: practical mostly-static information flow control , 1999, POPL '99.

[10]  Jan Vitek,et al.  Secure composition of insecure components , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[11]  David A. Wagner,et al.  A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.

[12]  Godmar Back Patrick Tullmann Leigh Stoller Wilson C. Hsie Lepreau Java Operating Systems : Design and Implementation , 1998 .

[13]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[14]  Deyu Hu,et al.  Implementing Multiple Protection Domains in Java , 1998, USENIX Annual Technical Conference.

[15]  Carl A. Gunter,et al.  PLAN: a packet language for active networks , 1998, ICFP '98.

[16]  Brian N. Bershad,et al.  Extensibility safety and performance in the SPIN operating system , 1995, SOSP.

[17]  Gul A. Agha,et al.  ACTORS - a model of concurrent computation in distributed systems , 1985, MIT Press series in artificial intelligence.

[18]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[19]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[20]  Jean-Henry Morin,et al.  HyperNews: a MEDIA application for the commercialization of an electronic newspaper , 1998, SAC '98.

[21]  L. Girardello,et al.  A note on regular type 0 solutions and confining gauge theories , 2001 .

[22]  Anand R. Tripathi,et al.  Agent Server Architecture for the Ajanta Mobile-Agent System , 1998 .

[23]  Graham Glass,et al.  ObjectSpace Voyager - The Agent ORB for Java , 1998, WWCA.

[24]  Eric Jul Object mobility in a distributed object-oriented system , 1990 .

[25]  Jan Vitek,et al.  A Coordination Model for Agents Based on Secure Spaces , 1999 .

[26]  Giovanni Vigna,et al.  Mobile Agents and Security , 1998, Lecture Notes in Computer Science.

[27]  Mike Hibler,et al.  Microkernels meet recursive virtual machines , 1996, OSDI '96.

[28]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.

[29]  Thomas Anderson,et al.  Interposition as an Operating System Extension Mechanism , 1997 .

[30]  Jan Vitek,et al.  Mobile Object Systems Towards the Programmable Internet , 1996, Lecture Notes in Computer Science.

[31]  Luca Cardelli,et al.  Abstractions for Mobile Computation , 1999, Secure Internet Programming.

[32]  Geoffrey Smith,et al.  A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..

[33]  Nicholas Carriero,et al.  Applications experience with Linda , 1988, PPoPP 1988.

[34]  Jean-Henry Morin,et al.  Commercialization of Electronic Information , 2000, J. Organ. End User Comput..

[35]  Christian F. Tschudin,et al.  The Messenger Environment MØ - A Condensed Description , 1996, Mobile Object Systems.

[36]  Joel H. Saltz,et al.  Sumatra: A Language for Resource-Aware Mobile Programs , 1996, Mobile Object Systems.

[37]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[38]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[39]  Silvano Gai,et al.  Exploiting Code Mobility in Decentralized and Flexible Network Management , 1997, Mobile Agents.

[40]  Jan Vitek,et al.  Confined types , 1999, OOPSLA '99.

[41]  Kurt Rothermel,et al.  Disseminating mobile agents for distributed information filtering , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.

[42]  Deyu Hu,et al.  J-Kernel: A Capability-Based Operating System for Java , 2001, Secure Internet Programming.

[43]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[44]  Martín Abadi,et al.  A calculus for access control in distributed systems , 1991, TOPL.

[45]  Xavier Leroy,et al.  Security properties of typed applets , 1998, POPL '98.

[46]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[47]  Jan Vitek,et al.  Security and Communication in Mobile Object Systems , 1996, Mobile Object Systems.

[48]  B LangeDanny,et al.  Mobile agents with Java , 1998 .

[49]  Danny B. Lange,et al.  Programming and Deploying Mobile Agents with Java Aglets , 1998 .

[50]  Thorsten von Eicken,et al.  JRes: a resource accounting interface for Java , 1998, OOPSLA '98.

[51]  Thomas E. Anderson,et al.  SLIC: An Extensibility System for Commodity Operating Systems , 1998, USENIX ATC.

[52]  Jochen Liedtke,et al.  Improving IPC by kernel design , 1994, SOSP '93.

[53]  Todd Fine,et al.  Assuring Distributed Trusted Mach , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[54]  Luca Cardelli,et al.  Mobile Ambients , 1998, FoSSaCS.