Access Control For Mobile Agents Sudipta Rakshit University of Central Florida, Spring 2002.

Slides:



Advertisements
Similar presentations
DISTRIBUTED COMPUTING PARADIGMS
Advertisements

Institut für Softwarewissenschaft - Universität WienP.Brezany 1 Multi-Agent Systems A Modern Approach to Distributed Artificial Intelligence Peter Brezany.
Agent agent Outline of Presentation Introduction: Inter-Agent Message Passing ARP: Design and Analysis Generalization: A Generic Framework Conclusion.
BARNALI CHAKRABARTY. What is an Operating System ?
Load Balancing using Mobile Agent Approach Prepared by: Wong Tsz Yeung,Ah Mole Supervisor : Prof. Michael Lyu 18 December 2000.
MODELLING OF MOBILE AGENT SYSTEMS USING dynPLA APPROACH Agnė Paulauskaitė-Tarasevičienė Henrikas Pranevičius 1.
Distributed Systems Topics What is a Distributed System?
P. Bellavista, A. Corradi, C. Stefanelli - ISADS'99 - Tokyo, 22 March A Secure and Open Mobile Agent (SOMA) Programming Environment Paolo Bellavista,
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Distributed Systems 1 Topics  What is a Distributed System?  Why Distributed Systems?  Examples of Distributed Systems  Distributed System Requirements.
Tam Vu Remote Procedure Call CISC 879 – Spring 03 Tam Vu March 06, 03.
Lime Team Adam Bazinet Hau San Si Tou. What is LIME?  LIME stands for Linda In a Mobile Environment Linda : a shared memory computing model developed.
Context-based Information Sharing and Authorization in Mobile Ad Hoc Networks Incorporating QoS Constraints Sanjay Madria, Missouri University of Science.
Mobile Agents in High Performance Computing System Presentation by : MADHAN MOHAN NARLAPURAM User Id: mmnarlap.
COS 420 Day 17. Agenda Assignment 4 Posted Chap Due April 6 Group project program requirements due Individual Project Graded 2 A’s and 1 B Today.
Scenario Based Interaction Model for a Mobile Agent System
Legion Worldwide virtual computer. About Legion Made in University of Virginia Object-based metasystems software project middleware that connects computer.
The Bio-Networking Architecture: An Infrastructure of Autonomic Agents in Pervasive Networks Jun Suzuki netresearch.ics.uci.edu/bionet/
Authorization. Authorization: Two Meanings Determining permission Is principal P permitted to perform action A on object U? Adding permission P is now.
Applications of agent technology in communications: a review S. S. Manvi &P. Venkataram Presented by Du-Shiau Tsai Computer Communications, Volume 27,
AgentOS: The Agent-based Distributed Operating System for Mobile Networks Salimol Thomas Department of Computer Science Illinois Institute of Technology,
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
Distributed Collaborations Using Network Mobile Agents Anand Tripathi, Tanvir Ahmed, Vineet Kakani and Shremattie Jaman Department of computer science.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
Summary :- Distributed Process Scheduling Prepared BY:- JAYA KALIDINDI.
Agent-based E-travel Agency Agent Systems Laboratory Oklahoma State University
1 Self-configuring of multiple frameworks for NCB Sean Leslie Ricardo Tirado Graduate Students: Andrew Allen.
Hossein Bastan Isfahan University of Technology 1/23.
Distributed Process Implementation Hima Mandava. OUTLINE Logical Model Of Local And Remote Processes Application scenarios Remote Service Remote Execution.
Distributed Process Implementation
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Using Mobile Agents for Network Resource Discovery in P2P Network Zhengzheng Wan.
15/06/1999HP OVUA Workshop - Bologna - Italy1 An Integrated Environment for the Management of Network Resources and Services Paolo Bellavista, Antonio.
Chapter 8-3 : Distributed Systems Distributed systems Distributed systems Document-based middleware Document-based middleware Coordination-based middleware.
LOGO Team ABACOPELAGO Dhawal Parkar Shashidhar Desai Tejaswinee Havaldar Team Report 3April 20, 2009.
Chapter 5.4 DISTRIBUTED PROCESS IMPLEMENTAION Prepared by: Karthik V Puttaparthi
Locating Mobile Agents in Distributed Computing Environment.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
MOBILE AGENTS What is a software agent ? Definition of an Agent (End-User point of view): An agent is a program that assists people and acts on their behalf.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
MagicNET: Security System for Protection of Mobile Agents.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Coordination Languages and their Significance Paper by: David Gelernter Nicholas Carriero Presented by: Varuna Iyengar.
Coordination Models and Languages Part I: Coordination Languages and Linda Part II: Technologies based on Tuple space concept beyond Linda Part III: Comparison.
Code Migration Russell T. Potee, III. Overview Why Code Migration? Code Migration Models Migration and Handling Resources Heterogeneous Systems Migration.
Architecture Models. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
Shuman Guo CSc 8320 Advanced Operating Systems
3/15/01CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Mobile Agents For Mobile Computing Department Of Computer Science – Dartmouth College Robert Gray David Kotz Saurab Nog Daniela Rus George Cybenko.
Distributed System Services Fall 2008 Siva Josyula
D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko,
ICT Today´s lecture 14:15Agent Technologies by Ismar Slomic 15:15 Practical Architecture Work at Telenor by Jan Øyvind Aagedal 16:15 Group exercise is.
Aglets Based on Mobile Agents with Java: The Aglet API by Danny B. Lange and Mitsuru Oshima.
Institute for Visualization and Perception Research 1 © Copyright 1999 Haim Levkowitz Java-based mobile agents.
EEL 5937 Mobile agents EEL 5937 Multi Agent Systems Lotzi Bölöni.
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
C HAPTER 5.4 DISTRIBUTED PROCESS IMPLEMENTAION By: Nabina Pradhan 10/09/2013.
Authentication in Dist Systems Presented in cs294-4 P2P Systems by Sailesh Krishnamurthy Oct
M OBILE A GENTS & JADE Shaquille Wilkins Zak Lowman.
On-Line Transaction Processing
Presented by: Saurav Kumar Bengani
Mobile Agents.
Mobile Agents M. L. Liu.
Unit V Mobile Middleware.
Autonomic Request Scheduling Container
Coordination Models and Languages
In Distributed Systems
Presentation transcript:

Access Control For Mobile Agents Sudipta Rakshit University of Central Florida, Spring 2002

Concepts Mobile Agent (MA): - Autonomous, executable program that can migrate on its own. Access Control: - Authentication of a request to use a resource and Authorization of the request

How it works The mobile agent visits one or several machines and either performs some task by itself or asks some resident program to perform the task for it (MA).

Problems Malicious hosts and/or code: - the host may change certain critical portion of the code and/or vice versa

Travel Agent Example Airline 2Airline 1 Travel Agent Customer Request(1) Result(5) MA(3) MA(2) MA(4)

Objective Objective: - 1.To design and implement an access control policy for the simple 2-3 servers system above. 2. To provide an access control framework for a more distributed system

References “Authentication in Distributed Systems: Theory and Practice”, B. Lampson, M. Abadi, M. Burrows, and E. Wobber. ACM Trans. Computer Systems 10, 4 (Nov. 1992), pp lampson.pdf?key1=138874&key2= &coll=portal&dl=ACM&CFID= &CFTOKEN = “Authentication for Mobile Agents”, Shimshon Berkovits, Joshua D. Guttman, and Vipin Swarup. LNCS 1419, pp “Linda in Context”, Nicholas Carriero and David Gelernter. Communications of the ACM April 1989, Volume 32 Issue 4, pp “Making Tuple Spaces Safe for Heterogeneous Distributed Systems”, N. H. Minsky, Y. M. Minsky and V. Ungureanu, ACM SAC 2000: Special Track on Coordination Models, Languages and Applications, Como, Italy, April, 2000, pp minsky.pdf?key1=335748&key2= &coll=portal&dl=ACM&CFID= &CFTOKEN= http://delivery.acm.org/ /340000/335748/p218- minsky.pdf?key1=335748&key2= &coll=portal&dl=ACM&CFID= &CFTOKEN=

Pointers to References 1. "Authentication for Mobile Agents" by Shimshon Berkovits, Joshua Guttman and Vipin Swarum LNCS vol 1419 pp "Making Tuple Spaces Safe for Heterogeneous Distributed Systems" Naftaly Minsky, Yaron Minsky and Victoria Ungureanu minsky.pdf?key1=335748&key2= &coll=portal&dl=ACM&CFID= & CFTOKEN= minsky.pdf?key1=335748&key2= &coll=portal&dl=ACM&CFID= & CFTOKEN= "Linda in Context" by Nicholas Carriero and David Gelernter....I am not providing the pointer to this paper as this one basically deals with how Linda works. 4. "Authentication in Distributed Systems" Lampson, Abdi, Burrows and Wobber. lampson.pdf?key1=138874&key2= &coll=portal&dl=ACM&CFID= &CFTOKEN= http://delivery.acm.org/ /140000/138874/p265- lampson.pdf?key1=138874&key2= &coll=portal&dl=ACM&CFID= &CFTOKEN=