TY - GEN
T1 - Secure and efficient mobile agent application reuse using patterns
AU - Tahara, Yasuyuki
AU - Yoshioka, Nobukazu
AU - Ohsuga, Akihiko
AU - Honiden, Shinichi
PY - 2001
Y1 - 2001
N2 - As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal with environmental changes and the various requirements of open networks through features such as autonomy, mobility, intelligence, cooperation, and reactivity. In addition, some people consider the agent technology as a promising solution to the reuse issue because of the aspect of the agents as highly adaptable software components. However, since the usual development methods of secure mobile agent applications are not sufficiently investigated, the technology is not yet widespread, In this paper, we propose a formal framework that supports mobile agent application development and reuse with consideration of the trade-offs between the security issues and the performance issues. In our framework, we design a mobile agent application by building a computational cost model and a security model, and combining patterns so that the combination satisfies the models. Therefore we can develop the application considering the security and the performance trade-offs. Since the models and the patterns are presented according to a formal framework, we can make sure that the pattern combination satisfies the models rigorously. In addition, if the security policy of the new environment is different from the old one in reusing the system in a new organization, we can easily modify and adapt the behavior because the pattern application can be figured out automatically by an algorithm.
AB - As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal with environmental changes and the various requirements of open networks through features such as autonomy, mobility, intelligence, cooperation, and reactivity. In addition, some people consider the agent technology as a promising solution to the reuse issue because of the aspect of the agents as highly adaptable software components. However, since the usual development methods of secure mobile agent applications are not sufficiently investigated, the technology is not yet widespread, In this paper, we propose a formal framework that supports mobile agent application development and reuse with consideration of the trade-offs between the security issues and the performance issues. In our framework, we design a mobile agent application by building a computational cost model and a security model, and combining patterns so that the combination satisfies the models. Therefore we can develop the application considering the security and the performance trade-offs. Since the models and the patterns are presented according to a formal framework, we can make sure that the pattern combination satisfies the models rigorously. In addition, if the security policy of the new environment is different from the old one in reusing the system in a new organization, we can easily modify and adapt the behavior because the pattern application can be figured out automatically by an algorithm.
UR - http://www.scopus.com/inward/record.url?scp=0035790617&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0035790617&partnerID=8YFLogxK
U2 - 10.1145/379377.375255
DO - 10.1145/379377.375255
M3 - Conference contribution
AN - SCOPUS:0035790617
SN - 1581133588
SN - 9781581133585
T3 - Proceedings of SSR'01 2001 Symposium on Software Reusability
SP - 78
EP - 85
BT - Proceedings of SSR'01 2001 Symposium on Software Reusability
PB - Association for Computing Machinery (ACM)
T2 - Proceedings of SSR'01 2001 Symposium on Software Reusability
Y2 - 18 May 2001 through 20 May 2001
ER -