Abstract
The increased heterogeneity and dynamism of new computing paradigms and especially of ubiquitous computing models is boosting the need for auto-configurable systems. In these new scenarios, heterogeneity and dynamism are inherent properties and applications are built by aggregating distributed information and services that are not under the control of a single entity. The current trend towards distributed computing poses important problems related to the transmission of large amounts of data between the nodes of the computing system; the control over the information; and the flexibility to adapt to heterogeneous client requirements. These characteristics, difficult to manage by traditional computing models, are making the mobile agent paradigm to gain momentum and increasing the interest of researchers and industry in this paradigm. In this paper we present a solution to provide a secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios, based on two main building blocks: trusted platforms and profiles.
Work partially supported by E.U. through projects Ubisec (IST-506926) and SERENITY (IST-027587) and by Spanish Ministry of Science and Education through research grant PR2005-0175.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Trusted Computing Group: TCG Specifications (2005), available online at https://www.trustedcomputinggroup.org/specs/
Resnick, P., Varian, H. (eds.): Communications of the ACM: Special Issue on Recommender Systems 46 (1997)
Riecken, D. (ed.): Commun. ACM: Special Issue on Personalization 43 (2000)
Maybury, M. (ed.): Commun. ACM: Special Issue on News on Demand 43 (2000)
Maybury, M., Brusilovsky, P. (eds.): Commun. ACM: The Adaptive Web 45 (2002)
Bygrave, L.: Electronic Agents and Privacy: A Cyberspace Odyssey 2001. Intl. Journal of Law and Information Technology 9(3), 280 (2001)
Pearson, S.: Trusted Agents that Enhance User Privacy by Self-Profiling. In: Proceedings of the AAMAS Workshop (Special track on privacy) (2002)
W3C: Resource Description Framework (RDF): Concepts and Abstract Syntax (2004)
W3C: CC/PP: Structure and Vocabularies 1.0 (January 2004), available online at http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html
Wireless Application Protocol Forum: Wireless Application Group User Agent Profile Specification (November 1999)
Foundation for Intelligent Physical Agents: FIPA Device Ontology Specification (December 2002), available online http://www.fipa.org
Chi, E.H.: Transient User Profiling. In: Proceedings of the workshop on User Profiling (2004)
Sparacino, F.: Sto(ry)chastics: a Bayesian Network Architecture for User Modelling and Computational Storytelling for Interactive Spaces. In: Proceedings of the Fifth International Conference on Ubiquitous Computing (2003)
Berkovits, S., Guttman, J., Swarup, V.: Authentication for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 114–136. Springer, Heidelberg (1998)
Maña, A.: Protección de Software Basada en Tarjetas Inteligentes. PhD Thesis. University of Málaga (2003)
Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. PhD Thesis. Universite Catholique de Louvain (2003)
Necula, G.: Proof-Carrying Code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)
Carl, A.G., Peter, H., Scott, N.: Infrastructure for Proof-Referencing Code. In: Proceedings of the Workshop on Foundations of Secure Mobile Code (March 1997)
Yee, B.S.: A Sanctuary for Mobile Agents. Secure Internet Programming (1999)
Piller, E., Schaumüller-Bichl, I.: A Method of Protection Based on the Use of Smart Cards and Cryptographic Techniques. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 446–454. Springer, Heidelberg (1985)
Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000)
Collberg, C., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. University of Auckland Technical Report #170 (2000)
Wayner, P.: Dissapearing Cryptography. In: Information Hiding, Stenography and Watermarking, Morgan Kauffman, San Francisco (2002)
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)
Goldreich, O.: Towards a theory of software protection. In: Proceedings of the 19th Ann. ACM Symposium on Theory of Computing, pp. 182–194 (1987)
Sander, T., Tschudin, C.F.: On Software Protection via Function Hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 111–123. Springer, Heidelberg (1998)
Pearson, S., Balacheff, B., Chen, L., Plaquin, D., Proudler, G.: Trusted Computer Platforms. Prentice-Hall, Englewood Cliffs (2003)
Arbaugh, W., Farber, D., Smith, J.: A Secure and Reliable Bootstrap Architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 65–71 (1997)
Ghosh, A., Schwartbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Usenix (1999)
Maña, A., Muñoz, A.: Mutual Protection for Multiagent Systems. In: Proceedings of the Third International Workshop on Safety and Security in Multiagent Systems (SASEMAS 2006) (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
López, J., Maña, A., Muñoz, A. (2006). A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_99
Download citation
DOI: https://doi.org/10.1007/11833529_99
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38091-7
Online ISBN: 978-3-540-38092-4
eBook Packages: Computer ScienceComputer Science (R0)