iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/978-0-387-30440-3_333
Mobile Agents | SpringerLink
Skip to main content
  • 118 Accesses

D efinition of the Subject

Mobile agents areprograms t hat, with varying degrees of autonomy, can move between hosts across a network. Mobile agents combine the notionsof mobile code, mobile computation, and mobile state. They are location aware and can move to new network locations through explicit mobility operations.Mobile agents realize the notion of moving the computation to the data as opposed to moving the data to the computation, which is an important paradigmfor distributed computing. Mobile agents are effective in operating in networks that tend to disconnect, have low bandwidth, or high latency.

Introduction

Advances in computer communications and computing power have changed the landscape of computing: computing devices ranging from the smallestembedded sensors to the largest servers are routinely interconnected and must interoperate. Their connections often are set up over untrusted anduntrustworthy networks, with limited connectivity and dynamic topologies. The...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Bibliography

Primary Literature

  1. Baumann J, Hohl F, Rothermel K, Straßer M (1998) Mole – concepts of a mobile agent system. WWW Journal, Special issue on Appl Tech Web Agents (to appear)

    Google Scholar 

  2. Bettini L, De Nicola R (2001) Translating strong mobility into weak mobility. Mobile Agents

    Google Scholar 

  3. Binder W (2001) Design and implementation of the J-SEAL2 mobile agent kernel. In: The 2001 Symposium on Applications and the Internet (SAINT-2001), San Diego, January 2001

    Google Scholar 

  4. Borenstein NE (1994) E-mail with a mind of its own: The SafeTcl language for enabled mail. In: Proceedings of IFIP International Conference, Barcelona, Spain, 1994

    Google Scholar 

  5. Bouchenak S (1999) Pickling threads state in the Java system. In: 3rd European Research Seminar on Advances in Distributed Systems (ERSADS’99), Madeira Island, Portugal, April 1999

    Google Scholar 

  6. Bryce C, Vitek J (1999) The javaseal mobile agent kernel. In: Milojevic D (ed) Proceedings of the 1st International Symposium on Agent Systems and Applications, Third International Symposium on Mobile Agents (ASAMA’99), Palm Springs, 9-13 May 1999. ACM Press, pp 176–189

    Google Scholar 

  7. Bryce C, Vitek J (2002) The JavaSeal mobile agent kernel. Auton Agents MultiAgent Syst

    Google Scholar 

  8. Cardelli L, Ghelli G (2001) A query language based on the ambient logic. Programming languages and systems. In: 10th European Symposium on Programming, ESOP 2001

    Google Scholar 

  9. Cardelli L, Gordon AD (1999) Types for mobile ambients. In: Proceedings of the 26th ACM Symposium on Principles of Programming Languages, 1999. pp 79–92

    Google Scholar 

  10. Cardelli L, Gordon AD (2000) Anytime, anywhere. Modal logics for mobile ambients. In: Proceedings of the 27th ACM Symposium on Principles of Programming Languages, 2000. pp 365–377

    Google Scholar 

  11. Cardelli L, Gordon AD (2000) Mobile ambients. TCS special issue on coordination. D Le Métayer

    Google Scholar 

  12. Cardelli L, Ghelli G, Gordon AD (2000) Types for the ambient calculus. In: I&C special issue on TCS’2000

    Google Scholar 

  13. Colusa Software (1995) Omniware: a universal substrate for mobile code. White paper, Colusa Software. http://www.colusa.com

  14. Farmer WM, Guttman JD, Swarup V (1996) Security for mobile agents: Issues and requirements. In: National Information Systems Security Conference. National Institute of Standards and Technology

    Google Scholar 

  15. Fuggetta A, Picco GP, Vigna G (1998) Understanding code mobility. IEEE Trans Softw Eng

    Google Scholar 

  16. Funfrocken S (1998) Transparent migration of Java-based mobile agents: Capturing and reestablishing the state of Java programs. In: Proceedings of the Second International Workshop on Mobile Agents, September 1998. Lecture Notes in Computer Science, no 1477. Springer, Stuttgart, pp 26–37

    Google Scholar 

  17. Goldberg A (1998) A specification of java loading and bytecode verification. In: Proceedings of the Fifth ACM Conference on Computer and Communications Security, 1998

    Google Scholar 

  18. Gong L, Mueller M, Prafullchandra H, Schemers R (1997) Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In: Proceedings of the USENIX Symposium on Internet Technologies and Systems, Monterey, California, December 1997

    Google Scholar 

  19. Grimm R, Bershad BN (1999) Providing policy‐neutral and transparent access control in extensible systems. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146

    Google Scholar 

  20. Hartel PH, Moreau LAV (2001) Formalizing the safety of Java, the Java Virtual Machine and Java Card. ACM Comput Surv (to appear)

    Google Scholar 

  21. Hohl F (1997) Time limited blackbox security: protecting mobile agents from malicious hosts. Mobile Agent Security. Lecture Notes in Computer Science. Springer, Berlin

    Google Scholar 

  22. Jaeger T (1999) Access control in configurable systems. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146

    Google Scholar 

  23. Jensen T, Le Metayer D, Thorn T (1998) Security and dynamic class loading in Java: A formalization. In: Proceedings of the 1998 IEEE International Conference on Computer Languages, May 1998, pp 4–15

    Google Scholar 

  24. Jones MB (1999) Interposition agents: Transparently interposing user code at the system interface. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146

    Google Scholar 

  25. Lange D, Oshima M (1998) Programming and deploying Java Mobile Agents with aglets. Addison Wesley

    Google Scholar 

  26. Loureiro S (2001) Mobile code protection. Ph D thesis, Sophia Antipolis

    Google Scholar 

  27. Malkhi D, Reiter MK, Rubin AD (1998) Secure execution of Java applets using a remote playground. In: Proc of the 1998 IEEE Symp on Security and Privacy, Oakland, May 1998, pp 40–51

    Google Scholar 

  28. Necula GC, Lee P (1998) Safe untrusted agents using using proof‐carrying code. In: Vigna G (ed) Special issue on mobile agent security, vol 1419 of Lect. Notes in Computer Science. Springer, pp 61–91

    Google Scholar 

  29. Ousterhout JK, Levy JY, Welch BB (1997) The Safe-Tcl Security Model. Technical report. Sun Microsystems Laboratories, Mountain View. Online at http://research.sun.com/techrep/1997/abstract-60.html

  30. Puliato B, Riccobene S, Scarpa M (1999) An analytical comparison of the clientsever, Remote evaluation, and Mobile Agents paradigms. In: Proc. ASA/MA’99, pp 278–292, October 1999

    Google Scholar 

  31. Quitadamo R, Cabri G, Leonardi L (2006) Enabling Java mobile computing on the IBM Jikes Research Virtual Machine. In: The International Conference on the Principles and Practice of Programming in Java 2006 (PPPJ 2006). ACM Press, Mannheim

    Google Scholar 

  32. Roth V (1999) Mutual protection of cooperating agents. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146

    Google Scholar 

  33. Sander T, Tschudin CF (1998) Protecting Mobile Agents Against Malicious Hosts. In: Vigna D (ed) Mobile Agent and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin

    Google Scholar 

  34. Segal ME (1991) Extending dynamic program updating systems to support distributed systems that communicate via remote evaluation. In: Proc. International Workshop on Configurable Distributed Systems, 1991, pp 188–199

    Google Scholar 

  35. Sekiguchi T, Masuhara H, Yonezawa A (1999) A simple extension of Java language for controllable transparent migration and its portable implementation. In: Coordination Languages and Models. Lecture Notes in Computer Science, pp 211–226

    Google Scholar 

  36. Stamos JW (1986) Remote evaluation. Ph D thesis, Massachusetts Institute of Technology. Technical report MIT/LCS/TR-354

    Google Scholar 

  37. Stamos JW, Gifford DK (1990) Implementing remote evaluation. IEEE Trans Softw Eng 16(7)

    Google Scholar 

  38. Stamos JW, Gifford DK (1990) Remote evaluation. ACM Trans Program Lang Syst 12(4):537–565

    Google Scholar 

  39. Suri N, Bradshaw JM, Breedy MR, Groth PT, Hill GA, Jeffers R, Mitrovich TR, Pouliot BR, Smith DS (2000) NOMADS: Toward an environment for strong and safe agent mobility. In: Proceedings of Autonomous Agents ’2000, Barcelona, Spain. ACM Press, New York

    Google Scholar 

  40. Suri N, Bradshaw JM, Breedy MR, Groth PT, Hill GA, Jeffers R (2000) Strong mobiling and fine‐grained resource control in NOMADS. Agent Systems, Mobile Agents, and applications. Lecture Notes in Computer Science, vol 1882. Springer, Berlin

    Google Scholar 

  41. Suri N et al (2003) Applying agile computing to support efficient and policy‐controlled sensor information feeds in the army future combat systems environment. In: Proceedings of the U.S. Army 2003 Annual Collaborative Technology Symposium

    Google Scholar 

  42. Suri N, Bradshaw J, Carvalho M, Breedy M, Cowin T, Saavedra R, Kulkarni S (2003) Applying agile computing to support efficient and policy‐controlled sensor information feeds in the army future combat systems environment. In: Proceedings of the Collaborative Technologies Alliance Conference (CTA 2003), College Park

    Google Scholar 

  43. Suri N, Bradshaw J, Carvalho M, Cowin T, Breedy M, Groth P, Saavedra R (2003) Agile computing: Bridging the gap between Grid computing and Ad-hoc Peer-to-Peer resource sharing. In: Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid), 2003

    Google Scholar 

  44. Tardo J, Valenta L (1996) Mobile agent security and telescript. In: Proceedings of IEEE COMPCON, February 1996

    Google Scholar 

  45. Truyen E, Robben B, Vanhaute B, Coninx T, Joosen W, Verbaeten P (2000) Portable support for transparent thread migration in Java. In: Proceedings of the Joint Symposium on Agent Systems and Applications / Mobile Agents (ASA/MA), September 2000, pp 29–43

    Google Scholar 

  46. Tschudin C The messenger environment M0 – A condensed description. In: Vitek J, Tschudin C (eds) Mobile object systems. Lecture Notes in Computer Science, vol 1222. Springer, Berlin

    Google Scholar 

  47. Tschudin C, Lundgren H, Gulbrandsen H (2000) Active routing for Ad Hoc Networks. IEEE Commun Mag

    Google Scholar 

  48. Tschudin CF (1999) Mobile agent security. In: Klusch M (ed) Intelligent information agents. Springer

    Google Scholar 

  49. Vigna J (1998) Cryptographic traces for Mobile Agents. In: Vigna G (ed) Mobile agent security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, pp 137–153

    Google Scholar 

  50. Vitek J, Castagna G (1999) Seal: A framework for secure mobile computations. In: Bal HE, Belkhouche B, Cardelli L (eds) Internet programming languages. Lecture Notes in Computer Science, vol 1686. Springer

    Google Scholar 

  51. Vogler H, Moschgath M-L, Kunkelmann T (1997) An approach for Mobile Agent Security and fault tolerance using distributed transactions. Darmstadt Univ of Technology, ITO, Proc of ICPADS’97 (to appear)

    Google Scholar 

  52. Volpano D, Smith G (1998) Language issues in mobile program security. In: Vigna G (ed) Mobile agent security. Lecture Notes in Computer Science, no 1419. Springer, pp 25–43

    Google Scholar 

  53. Von Eicken T, Chang C-C, Czajkowski G, Hawblitzel C (1999) J-Kernel: A capability‐based operating system for Java. Lect Notes Comput Sci 1603:369–394

    Google Scholar 

  54. Wallach DS (1999) A New approach to mobile code security. Ph D Thesis, Princeton University

    Google Scholar 

  55. Wallach DS, Balfanz D, Dean D, Felten EW (1997) Extensible security architectures for Java. Technical report 546–97, Department of Computer Science, Princeton University

    Google Scholar 

  56. White JE (1997) Telescript. In: Cockayne WR, Zyda M (eds) Mobile agents. Manning Publ, Greenwich, pp 37–57

    Google Scholar 

  57. White JE (1997) Mobile agents. In: Bradshaw JM (ed) Software agents. AAAI/MIT Press, Cambridge, pp 437–472

    Google Scholar 

  58. Wilhelm UG, Staamann S, Buttyn L (1999) Introducing trusted third parties to the mobile agent paradigm. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146

    Google Scholar 

  59. Yee B (1999) A sanctuarity for mobile agents. In: Vitek J, Jensen C (eds) Secure internet programming: Security issues for distributed and mobile objects. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, pp 117–146

    Google Scholar 

Books and Reviews

  1. Barak B et al (2001) On the (im)possibility of obfuscating. In: CRYPTO `01, Santa Barbara, 19–23 August. Lecture Notes in Computer Science, vol 2139. Springer, Berlin, pp 1–18.

    Google Scholar 

  2. Braun P, Rossak W (2004) Mobile Agents: Basic concepts, mobility models, and the Tracy Toolkit. Morgan Kauffman

    Google Scholar 

  3. Cardelli L, Ghelli G, Gordon AD (1999) Mobility types for mobile ambients. In: Wiedermann J, van Emde Boas P, Nielsen M (eds) Automata, languagese and programming. In: 26th International Colloquium, ICALP’99 Proceedings. Lecture Notes in Computer Science, vol 1644. Springer, Berlin

    Google Scholar 

  4. Cardelli L, Ghelli G, Gordon AD (2000) Ambient groups and mobility types. In: van Leeuwen J, Watanabe O, Hagiya M, Mosses PD, Ito T (eds) Theoretical computer science

    Google Scholar 

  5. Carriero N, Gelernter D (1989) Linda in context. Commun ACM 32(4):444–458

    Google Scholar 

  6. Carvalho M, Breedy M (2002) Supporting flexible data feeds in dynamic sensor grids through mobile agents. In: Proceedings of the 6th IEEE International Conference on Mobile Agents. Springer

    Google Scholar 

  7. Gong L, Schemers R (1998) Signing, sealing, and guarding Java Objects. In: Vigna G (ed) Mobile agent security. Lecture Notes in Computer Science, vol 1420. Springer, Berlin, pp 206–216

    Google Scholar 

  8. Gray RS (1996) Agent Tcl: A flexible and secure mobile‐agent system. In: Proceedings of the 4th Annual Tcl/Tk Workshop (TCL 96), July 1996, pp 9–23

    Google Scholar 

  9. Gray R, Kotz D, Cybenko G, Rus D (1998) Security in a multiple‐language mobile‐agent system, In: Vigna G (ed) Lecture Notes in Computer Science: Mobile Agents and Security

    Google Scholar 

  10. McGraw G, Felten EW (1997) Java security: Hostile applets, holes, and antidotes. Wiley

    Google Scholar 

  11. Murphy AL, Picco GP, Roman G-C (2001) Lime: A middleware for physical and logical mobility. In: Proceedings of the 21 st International Conference on Distributed Computing Systems (ICDCS-21), May 2001

    Google Scholar 

  12. Picco GP, Murphy AL, Roman G-C (1999) Lime: Linda meets mobility. In: Garlan D (ed) Proceedings of the 21 st International Conference on Software Engineering, May 1999

    Google Scholar 

  13. Tschudin C (1994) An introduction to the M0 messenger system. Technical report 86 (Cahier du CUI), University of Geneva

    Google Scholar 

  14. Volpano D (1996) Provably‐secure programming languages for remote evaluation. ACM Comput Surv 28A(2):electronic

    Google Scholar 

Download references

Acknowledgments

Portions of this chapter were initially written for the Information Technology Assessment Consortium(ITAC) at the Institute for Human & Machine Cognition (IHMC) as part of a report entitled Software Agents for the Warfighter, sponsored by NASAand DARPA, and edited by Jeffrey Bradshaw at IHMC.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag

About this entry

Cite this entry

Suri, N., Vitek, J. (2009). Mobile Agents . In: Meyers, R. (eds) Encyclopedia of Complexity and Systems Science. Springer, New York, NY. https://doi.org/10.1007/978-0-387-30440-3_333

Download citation

Publish with us

Policies and ethics