Secure and efficient mobile agent application development using patterns (Japanese)

In: Transactions of the Information Processing Society of Japan   ;  44 ,  6  ;  1483-1497  ;  2003
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

As wide-area open networks like the Internet and intranet grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal with environmental changes and the various requirements of open networks through features such as autonomy, mobility, intelligence, cooperation, and reactivity. However, since the usual development methods of secure and efficient distributed applications considering mobile agents are not sufficiently investigated, the technology is not yet widespread. In this paper, we propose a formal framework that supports distributed application development considering mobile agents and resolving the trade-offs between the security issues and the performance issues. In our framework, we design the behavior of mobile agents by building models including the computational costs and the security policies, and combining patterns so that the combination satisfies the models. Therefore, we can develop the application resolving the security and the performance trade-offs. Since the models and the patterns are presented according to a formal framework, we can make sure that the pattern combination satisfies the models rigorously. In addition, if the security policy changes, we can easily modify the behavior because the pattern combination can be figured out automatically by an algorithm.

Table of contents – Volume 44, Issue 6

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

Secure and efficient mobile agent application development using patterns
Tahara, Y. / Yoshioka, N. / Ohsuga, A. / Honiden, S. | 2003
A generic fine-grained software repository using XML
Yoshida, H. / Yamamoto, S. / Agusa, K. | 2003
An efficient technique for corner-turn in SAR image reconstruction by improving cache access
Izumi, H. / Nakajima, T. / Sato, H. | 2003
A scheduling scheme for waiting time reduction on continuous media data broadcast
Yoshihisa, T. / Tsukamoto, M. / Nishio, S. | 2003
Implementation and evaluation of TCP / IP protocol stack for embedded system
Abe, T. / Yoshimura, H. / Kubo, H. | 2003
Design and implementation of network monitoring circuits for high speed networks
Kirimura, M. / Takamoto, Y. / Mori, T. / Yasumoto, K. / Nakata, A. / Higashino, T. | 2003
Notification of certificate revocation status between different domains under a PKI system
Miyake, Y. / Millen, J.K. / Denker, G. / Tanaka, T. / Nakao, K. | 2003
Protecting mobile agents against malicious hosts using tamper resistant hardware
Haruki, H. / Kawaguchi, N. / Inagaki, Y. | 2003
An educational software supporting learning through group competition using an interactive electronic whiteboard and its effects
Otsuki, Y. / Bandoh, H. / Kato, N. / Nakagawa, M. | 2003