Secure and efficient mobile agent application reuse using patterns

Yasuyuki Tahara, Nobukazu Yoshioka, Akihiko Ohsuga, Shinichi Honiden

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal with environmental changes and the various requirements of open networks through features such as autonomy, mobility, intelligence, cooperation, and reactivity. In addition, some people consider the agent technology as a promising solution to the reuse issue because of the aspect of the agents as highly adaptable software components. However, since the usual development methods of secure mobile agent applications are not sufficiently investigated, the technology is not yet widespread, In this paper, we propose a formal framework that supports mobile agent application development and reuse with consideration of the trade-offs between the security issues and the performance issues. In our framework, we design a mobile agent application by building a computational cost model and a security model, and combining patterns so that the combination satisfies the models. Therefore we can develop the application considering the security and the performance trade-offs. Since the models and the patterns are presented according to a formal framework, we can make sure that the pattern combination satisfies the models rigorously. In addition, if the security policy of the new environment is different from the old one in reusing the system in a new organization, we can easily modify and adapt the behavior because the pattern application can be figured out automatically by an algorithm.

Original languageEnglish
Title of host publicationProceedings of SSR'01 2001 Symposium on Software Reusability
Pages78-85
Number of pages8
Publication statusPublished - 2001 Dec 1
Externally publishedYes
EventProceedings of SSR'01 2001 Symposium on Software Reusability - Toronto, Ont., Canada
Duration: 2001 May 182001 May 20

Other

OtherProceedings of SSR'01 2001 Symposium on Software Reusability
CountryCanada
CityToronto, Ont.
Period01/5/1801/5/20

Fingerprint

Mobile agents
Intranets
Internet
Costs

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Tahara, Y., Yoshioka, N., Ohsuga, A., & Honiden, S. (2001). Secure and efficient mobile agent application reuse using patterns. In Proceedings of SSR'01 2001 Symposium on Software Reusability (pp. 78-85)

Secure and efficient mobile agent application reuse using patterns. / Tahara, Yasuyuki; Yoshioka, Nobukazu; Ohsuga, Akihiko; Honiden, Shinichi.

Proceedings of SSR'01 2001 Symposium on Software Reusability. 2001. p. 78-85.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tahara, Y, Yoshioka, N, Ohsuga, A & Honiden, S 2001, Secure and efficient mobile agent application reuse using patterns. in Proceedings of SSR'01 2001 Symposium on Software Reusability. pp. 78-85, Proceedings of SSR'01 2001 Symposium on Software Reusability, Toronto, Ont., Canada, 01/5/18.
Tahara Y, Yoshioka N, Ohsuga A, Honiden S. Secure and efficient mobile agent application reuse using patterns. In Proceedings of SSR'01 2001 Symposium on Software Reusability. 2001. p. 78-85
Tahara, Yasuyuki ; Yoshioka, Nobukazu ; Ohsuga, Akihiko ; Honiden, Shinichi. / Secure and efficient mobile agent application reuse using patterns. Proceedings of SSR'01 2001 Symposium on Software Reusability. 2001. pp. 78-85
@inproceedings{3ef4d1d22bf04cbb977bc4391674d2df,
title = "Secure and efficient mobile agent application reuse using patterns",
abstract = "As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal with environmental changes and the various requirements of open networks through features such as autonomy, mobility, intelligence, cooperation, and reactivity. In addition, some people consider the agent technology as a promising solution to the reuse issue because of the aspect of the agents as highly adaptable software components. However, since the usual development methods of secure mobile agent applications are not sufficiently investigated, the technology is not yet widespread, In this paper, we propose a formal framework that supports mobile agent application development and reuse with consideration of the trade-offs between the security issues and the performance issues. In our framework, we design a mobile agent application by building a computational cost model and a security model, and combining patterns so that the combination satisfies the models. Therefore we can develop the application considering the security and the performance trade-offs. Since the models and the patterns are presented according to a formal framework, we can make sure that the pattern combination satisfies the models rigorously. In addition, if the security policy of the new environment is different from the old one in reusing the system in a new organization, we can easily modify and adapt the behavior because the pattern application can be figured out automatically by an algorithm.",
author = "Yasuyuki Tahara and Nobukazu Yoshioka and Akihiko Ohsuga and Shinichi Honiden",
year = "2001",
month = "12",
day = "1",
language = "English",
isbn = "1581133588",
pages = "78--85",
booktitle = "Proceedings of SSR'01 2001 Symposium on Software Reusability",

}

TY - GEN

T1 - Secure and efficient mobile agent application reuse using patterns

AU - Tahara, Yasuyuki

AU - Yoshioka, Nobukazu

AU - Ohsuga, Akihiko

AU - Honiden, Shinichi

PY - 2001/12/1

Y1 - 2001/12/1

N2 - As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal with environmental changes and the various requirements of open networks through features such as autonomy, mobility, intelligence, cooperation, and reactivity. In addition, some people consider the agent technology as a promising solution to the reuse issue because of the aspect of the agents as highly adaptable software components. However, since the usual development methods of secure mobile agent applications are not sufficiently investigated, the technology is not yet widespread, In this paper, we propose a formal framework that supports mobile agent application development and reuse with consideration of the trade-offs between the security issues and the performance issues. In our framework, we design a mobile agent application by building a computational cost model and a security model, and combining patterns so that the combination satisfies the models. Therefore we can develop the application considering the security and the performance trade-offs. Since the models and the patterns are presented according to a formal framework, we can make sure that the pattern combination satisfies the models rigorously. In addition, if the security policy of the new environment is different from the old one in reusing the system in a new organization, we can easily modify and adapt the behavior because the pattern application can be figured out automatically by an algorithm.

AB - As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal with environmental changes and the various requirements of open networks through features such as autonomy, mobility, intelligence, cooperation, and reactivity. In addition, some people consider the agent technology as a promising solution to the reuse issue because of the aspect of the agents as highly adaptable software components. However, since the usual development methods of secure mobile agent applications are not sufficiently investigated, the technology is not yet widespread, In this paper, we propose a formal framework that supports mobile agent application development and reuse with consideration of the trade-offs between the security issues and the performance issues. In our framework, we design a mobile agent application by building a computational cost model and a security model, and combining patterns so that the combination satisfies the models. Therefore we can develop the application considering the security and the performance trade-offs. Since the models and the patterns are presented according to a formal framework, we can make sure that the pattern combination satisfies the models rigorously. In addition, if the security policy of the new environment is different from the old one in reusing the system in a new organization, we can easily modify and adapt the behavior because the pattern application can be figured out automatically by an algorithm.

UR - http://www.scopus.com/inward/record.url?scp=0035790617&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0035790617&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:0035790617

SN - 1581133588

SP - 78

EP - 85

BT - Proceedings of SSR'01 2001 Symposium on Software Reusability

ER -