A secure and open mobile agent programming environment

The Mobile Agent technology is suitable for applications in open, distributed and heterogeneous environments such as the Internet and the Web, because it can overcome some limits of traditional approaches. The paper describes a Secure and Open Mobile Agent (SOMA) programming environment with two main design objectives that are security and interoperability. On the one hand SOMA is based on a thorough security model and provides a wide range of tools and mechanisms to build and enforce flexible security policies. On the other hand, the SOMA framework can interoperate with different application components designed with different programming styles. SOMA grants interoperability by closely considering compliance with CORBA, the most diffused standard in the area of Object-Oriented components. SOMA has been adopted as a platform to develop several distributed applications in the area of network and systems management, CSCW, and distributed and heterogeneous information systems.

[1]  Giovanni Vigna,et al.  Understanding Code Mobility , 1998, IEEE Trans. Software Eng..

[2]  Giovanni Vigna,et al.  Mobile Agents and Security , 1998, Lecture Notes in Computer Science.

[3]  Jim Waldo,et al.  A Note on Distributed Computing , 1996, Mobile Object Systems.

[4]  Emil C. Lupu,et al.  A policy based role object model , 1997, Proceedings First International Enterprise Distributed Object Computing Workshop.

[5]  Scott M. Lewandowski,et al.  Frameworks for component-based client/server computing , 1998, CSUR.

[6]  Antonio Corradi,et al.  Locality abstractions and security models in a mobile agent environment , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).

[7]  Jan Vitek,et al.  Mobile Object Systems Towards the Programmable Internet , 1996, Lecture Notes in Computer Science.

[8]  David Wong,et al.  Security and reliability in Concordia , 1999 .

[9]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[10]  Guy L. Steele,et al.  The Java Language Specification , 1996 .

[11]  David K. Gifford,et al.  Remote evaluation , 1990, TOPL.

[12]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[13]  William Stallings Network and Internetwork Security: Principles and Practice , 1994 .