Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Included in the following conference series:

  • 671 Accesses

Abstract

The increased heterogeneity and dynamism of new computing paradigms and especially of ubiquitous computing models is boosting the need for auto-configurable systems. In these new scenarios, heterogeneity and dynamism are inherent properties and applications are built by aggregating distributed information and services that are not under the control of a single entity. The current trend towards distributed computing poses important problems related to the transmission of large amounts of data between the nodes of the computing system; the control over the information; and the flexibility to adapt to heterogeneous client requirements. These characteristics, difficult to manage by traditional computing models, are making the mobile agent paradigm to gain momentum and increasing the interest of researchers and industry in this paradigm. In this paper we present a solution to provide a secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios, based on two main building blocks: trusted platforms and profiles.

Work partially supported by E.U. through projects Ubisec (IST-506926) and SERENITY (IST-027587) and by Spanish Ministry of Science and Education through research grant PR2005-0175.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Trusted Computing Group: TCG Specifications (2005), available online at https://www.trustedcomputinggroup.org/specs/

  2. Resnick, P., Varian, H. (eds.): Communications of the ACM: Special Issue on Recommender Systems 46 (1997)

    Google Scholar 

  3. Riecken, D. (ed.): Commun. ACM: Special Issue on Personalization 43 (2000)

    Google Scholar 

  4. Maybury, M. (ed.): Commun. ACM: Special Issue on News on Demand 43 (2000)

    Google Scholar 

  5. Maybury, M., Brusilovsky, P. (eds.): Commun. ACM: The Adaptive Web 45 (2002)

    Google Scholar 

  6. Bygrave, L.: Electronic Agents and Privacy: A Cyberspace Odyssey 2001. Intl. Journal of Law and Information Technology 9(3), 280 (2001)

    Google Scholar 

  7. Pearson, S.: Trusted Agents that Enhance User Privacy by Self-Profiling. In: Proceedings of the AAMAS Workshop (Special track on privacy) (2002)

    Google Scholar 

  8. W3C: Resource Description Framework (RDF): Concepts and Abstract Syntax (2004)

    Google Scholar 

  9. W3C: CC/PP: Structure and Vocabularies 1.0 (January 2004), available online at http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html

  10. Wireless Application Protocol Forum: Wireless Application Group User Agent Profile Specification (November 1999)

    Google Scholar 

  11. Foundation for Intelligent Physical Agents: FIPA Device Ontology Specification (December 2002), available online http://www.fipa.org

  12. Chi, E.H.: Transient User Profiling. In: Proceedings of the workshop on User Profiling (2004)

    Google Scholar 

  13. Sparacino, F.: Sto(ry)chastics: a Bayesian Network Architecture for User Modelling and Computational Storytelling for Interactive Spaces. In: Proceedings of the Fifth International Conference on Ubiquitous Computing (2003)

    Google Scholar 

  14. Berkovits, S., Guttman, J., Swarup, V.: Authentication for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 114–136. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  15. Maña, A.: Protección de Software Basada en Tarjetas Inteligentes. PhD Thesis. University of Málaga (2003)

    Google Scholar 

  16. Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. PhD Thesis. Universite Catholique de Louvain (2003)

    Google Scholar 

  17. Necula, G.: Proof-Carrying Code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)

    Google Scholar 

  18. Carl, A.G., Peter, H., Scott, N.: Infrastructure for Proof-Referencing Code. In: Proceedings of the Workshop on Foundations of Secure Mobile Code (March 1997)

    Google Scholar 

  19. Yee, B.S.: A Sanctuary for Mobile Agents. Secure Internet Programming (1999)

    Google Scholar 

  20. Piller, E., Schaumüller-Bichl, I.: A Method of Protection Based on the Use of Smart Cards and Cryptographic Techniques. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 446–454. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  21. Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  22. Collberg, C., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. University of Auckland Technical Report #170 (2000)

    Google Scholar 

  23. Wayner, P.: Dissapearing Cryptography. In: Information Hiding, Stenography and Watermarking, Morgan Kauffman, San Francisco (2002)

    Google Scholar 

  24. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  25. Goldreich, O.: Towards a theory of software protection. In: Proceedings of the 19th Ann. ACM Symposium on Theory of Computing, pp. 182–194 (1987)

    Google Scholar 

  26. Sander, T., Tschudin, C.F.: On Software Protection via Function Hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 111–123. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  27. Pearson, S., Balacheff, B., Chen, L., Plaquin, D., Proudler, G.: Trusted Computer Platforms. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

  28. Arbaugh, W., Farber, D., Smith, J.: A Secure and Reliable Bootstrap Architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 65–71 (1997)

    Google Scholar 

  29. Ghosh, A., Schwartbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Usenix (1999)

    Google Scholar 

  30. Maña, A., Muñoz, A.: Mutual Protection for Multiagent Systems. In: Proceedings of the Third International Workshop on Safety and Security in Multiagent Systems (SASEMAS 2006) (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

López, J., Maña, A., Muñoz, A. (2006). A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_99

Download citation

  • DOI: https://doi.org/10.1007/11833529_99

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38091-7

  • Online ISBN: 978-3-540-38092-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics