Abstract
Mobile agent technology offers a new approach to mining information from data sources distributed over the Internet. However, the potential benefits of mobile agents must be weighted against the real security threats. An agent based Distributed Data Mining (DDM) system must cope with exposed data services and insecure communication channels in the Internet to protect the privacy, integrity and availability of agents and distributed resources. In this paper, we present the design of a mobile agent infrastructure for DDM applications and discuss the implementation of security mechanism that has been effectively integrated with the mobile agent virtual machine.
Chapter PDF
Similar content being viewed by others
References
Klusch, M., Lodi, S., Moro, G.: The Role of Agents in Distributed Data Mining: Issues and Benefits. In: IEEE/WIC International Conference on Intelligent Agent Technology (IAT’03) (2003)
Park, B., Kargupta, H.: Distributed Data Mining: Algorithms, Systems, and Applications. In: Ye, N. (ed.) Data Mining Handbook (2002)
Krishnaswamy, S., Zaslasvky, A., Loke, S.W.: Internet Delivery of Distributed Data Mining Services: Architectures, Issues and Prospects. In: Murthy, V.K., Shi, N. (eds.) Architectural Issues of Web-enabled Electronic Business, pp. 113–127. Idea Group Publishing, Hershey (2003)
Borselius, N.: Mobile Agent Security. Electronic & Communication Engineering Journal 10, 211–218 (2002)
Karnik, N., Tripathi, A.: Security in the Ajanta mobile agent system. Software Practice and Experience 31(4), 301–329 (2001)
Gray, R., et al.: D’Agents: Security in a Multiple Language Mobile-agent System. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)
Li, X.: On the Implementation of IMAGO System. International Journal of Computer Science and Network Security 6(2a) 107–118 (2006)
Bettstetter, C., Renner, C.: A Comparison of Service Discovery Protocols and Implementation of the Service Location Protocol. In: Proc. of EUNICE 2000, sixth EUNICE Open European Summer School, pp. 13–15 (2000)
Salutation Consortium: Salutation Architecture Overview. White Paper (1998), http://www.salutation.org/whitepaper
Guttman, E., et al.: Service Location Protocol, Version 2, White Paper. In: IETF, RFC 2608 (1999)
OASIS UDDI, UDDI White Paper (2005), http://www.uddi.org
Song, L., Li, X., Ni, J.: A Database Service Discovery Model for Mobile Agents. International Journal of Intelligent Information Technologies 2(2), 16–29 (2006)
MySQL AB MySQL Reference Manual, user’s manual (2005), http://dev.mysql.com/doc/mysql/en/
Li, X., Autran, G.: Inter-agent Communication in IMAGO Prolog. In: Bordini, R.H., et al. (eds.) PROMAS 2004. LNCS (LNAI), vol. 3346, pp. 163–180. Springer, Heidelberg (2005)
FIPA ACL, Agent Communication Language Specifications, FIPA (2005), http://www.fipa.org
OpenSSL, http://www.openssl.org/
Greenberg, M., Byington, J., Harper, D.: Mobile Agents and Security. IEEE Communication Magazine 36(7), 76–85 (1998)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Li, X. (2007). Security in a Mobile Agent Based DDM Infrastructure. In: Gorodetsky, V., Zhang, C., Skormin, V.A., Cao, L. (eds) Autonomous Intelligent Systems: Multi-Agents and Data Mining. AIS-ADM 2007. Lecture Notes in Computer Science(), vol 4476. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72839-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-72839-9_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72838-2
Online ISBN: 978-3-540-72839-9
eBook Packages: Computer ScienceComputer Science (R0)