O'Reilly logo

Mobile Agents by Wilhelm R. Rossak, Peter Braun

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index 437
protection
agent, 178–198
data item, 289–290
domains, 201
read-only data, 188–189
protection, agency, 198–213
agent authentication/authorization,
204–210
agent execution, 210–211
introduction, 199–204
ProtocolEngine class, 260
proxy data, 81
public keys, 163
binding, 190
requesting, 286
of target agency, 289
trusted agencies, 177
pull strategy, 88
pull-all-units strategy, 88
PullPerClass class, 389
pull-per-unit strategy, 88, 121
PushAgent class, 388
PushAgentLoadOther class, 389
push-all-to-all strategy, 89, 114, 115, 116
heterogeneous network, 116
homogeneous network, 114
transmission times, 115
push-all-to-next strategy, 87, 114, 115, 116,
267–268
heterogeneous network, 116
homogeneous network, 114
migration, 267–268
transmission times, 115
push-all-units strategy, 114, 115, 116
heterogeneous network, 116
homogeneous network, 114
transmission times, 115
put and paste attack, 172
R
Readings in Agents, 10
read-only data
defined, 188
protecting, 188–189
See also data
read-only data items, 287–289
receiver agencies, 38, 220
address, 236
defined, 38
sending messages to, 236–242
region registry, 79, 96
registration
agent, 264–266
agent manager, 258
domain manager, 392
Kalong scripts, 371–372
listener object, 275
mandatory pipeline steps, 374
pipeline steps, 372–373
with services, 357–359
survival service, 360
reliability, communication, 133–134
remote agencies, 117
agent migration from, 121
availability, 237
data compression and, 304
defined, 226
starting, 79
See also agencies
remote method invocation (RMI), 14, 92
client-server approach, 70
defined, 42
power, 42
remote procedure calls (RPCs), 14, 18
agent migrations mixture, 53–54
extending, 18
remote-evaluation paradigm, 14–15
code size, 52–53
network load, 52
remote-evaluation (REV), 18–19
replication
of agencies, 184–185
of agents, 186–187
reply message, 221, 246, 277
request message, 221, 245–246
rollback message, 253
RSA encryption, 289
S
safety policies, 205
sandboxing, 200–202, 210
code source, 201
codebase, 201

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required