scispace - formally typeset
Search or ask a question
Author

Maggie Breedy

Bio: Maggie Breedy is an academic researcher from Florida Institute for Human and Machine Cognition. The author has contributed to research in topics: KAOS & Mobile agent. The author has an hindex of 19, co-authored 43 publications receiving 1227 citations. Previous affiliations of Maggie Breedy include United States Army Research Laboratory & University of West Florida.

Papers
More filters
Proceedings ArticleDOI
14 Jul 2003
TL;DR: Results, issues, and lessons learned in the development of KAoS representations, tools, and services and their use in military and space application are discussed.
Abstract: To increase the assurance with which agents can be deployed in operational settings, we have been developing the KAoS policy and domain services. In conjunction with Nomads strong mobility and safe execution features, KAoS services and tools allow for the specification, management, conflict resolution, and enforcement of DAML-based policies within the specific contexts established by complex organizational structures. In this paper, we will discuss results, issues, and lessons learned in the development of these representations, tools, and services and their use in military and space application.

162 citations

Book ChapterDOI
TL;DR: The NOMADS environment is composed of an agent execution environment called Oasis and a new Java-compatible Virtual Machine (VM) called Aroma that provides key enhancements over today’s Java agent environments.
Abstract: NOMADS is a Java-based agent system that supports strong mobility (i.e., the ability to capture and transfer the full execution state of migrating agents) and safe agent execution (i.e., the ability to control resources consumed by agents, facilitating guarantees of quality of service while protecting against denial of service attacks). The NOMADS environment is composed of two parts: an agent execution environment called Oasis and a new Java-compatible Virtual Machine (VM) called Aroma. The combination of Oasis and the Aroma VM provides key enhancements over today’s Java agent environments.

114 citations

Proceedings ArticleDOI
02 Jun 2008
TL;DR: This paper describes how these applications have motivated the partitioning of components into a well-defined three-layer policy management architecture that hides ontology complexity from the human user and from the policy-governed system.
Abstract: The KAoS policy management framework pioneered the use of semantically-rich ontological representation and reasoning to specify, analyze, deconflict, and enforce policies [9, 10]. The framework has continued to evolve over the last five years, inspired by both technological advances and the practical needs of its varied applications. In this paper, we describe how these applications have motivated the partitioning of components into a well-defined three-layer policy management architecture that hides ontology complexity from the human user and from the policy-governed system. The power of semantic reasoning is embedded in the middle layer of the architecture where it can provide the most benefit. We also describe how the policy semantics of the core KAoS policy ontology has grown in its comprehensiveness. The flexible and mature architecture of KAoS enables straightforward integration with a variety of deployment platforms, ranging from highly distributed systems, such as the AFRL information management system, to human-robotic interaction, to dynamic management of quality-of-service and cross-domain information management of wireless networks in resource-constrained or security-sensitive environments.

89 citations

Book ChapterDOI
TL;DR: This work presents scalability experiments that compare four mobile-agent platforms with a traditional client/server approach, and demonstrates the complex interaction between environmental, application, and system parameters.
Abstract: Building applications with mobile agents often reduces the bandwidth required for the application, and improves performance. The cost is increased server workload. There are, however, few studies of the scalability of mobile-agent systems. We present scalability experiments that compare four mobile-agent platforms with a traditional client/server approach. The four mobile-agent platforms have similar behavior, but their absolute performance varies with underlying implementation choices. Our experiments demonstrate the complex interaction between environmental, application, and system parameters.

85 citations

Proceedings ArticleDOI
01 Jun 2000
TL;DR: The NOMADS environment is composed of two parts: an agent execution environment called Oasis and a new Javacompatible Virtual Machine (VM) called Aroma that provides key enhancements over today's Java agent environments.
Abstract: NOMADS is a mobile agent system that supports strong mobility (i.e., the ability to capture and transfer the full execution state of mobile agents) and safe Java agent execution (i.e., the ability to control resources consumed by agents, facilitating guarantees of quality of service while protecting against denial of service attacks). The NOMADS environment is composed of two parts: an agent execution environment called Oasis and a new Javacompatible Virtual Machine (VM) called Aroma. The combination of Oasis and the Aroma VM provides key enhancements over today's Java agent environments.

80 citations


Cited by
More filters
Book ChapterDOI
07 Nov 2004
TL;DR: The experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment is described and how this work has uncovered requirements for increasing the expressivity of policy beyond what can be done with description logic is described.
Abstract: In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment. We are developing these capabilities within the context of two applications: Coalition Search and Rescue (CoSAR-TS) and Semantic Firewall (SFW). We describe how this work has uncovered requirements for increasing the expressivity of policy beyond what can be done with description logic (e.g., role-value-maps), and how we are extending our representation and reasoning mechanisms in a carefully controlled manner to that end. Since KAoS employs OWL for policy representation, it fits naturally with the use of OWL-S workflow descriptions generated by the AIAI I-X planning system in the CoSAR-TS application. The advanced reasoning mechanisms of KAoS are based on the JTP inference engine and enable the analysis of classes and instances of processes from a policy perspective. As the result of analysis, KAoS concludes whether a particular workflow step is allowed by policy and whether the performance of this step would incur additional policy-generated obligations. Issues in the representation of processes within OWL-S are described. Besides what is done during workflow composition, aspects of policy compliance can be checked at runtime when a workflow is enacted. We illustrate these capabilities through two application examples. Finally, we outline plans for future work.

636 citations

Proceedings ArticleDOI
04 Jun 2003
TL;DR: A policy language designed for pervasive computing applications that is based on deontic concepts and grounded in a semantic language that demonstrates the feasibility of the policy language in pervasive environments through a prototype used as part of a secure pervasive system.
Abstract: We describe a policy language designed for pervasive computing applications that is based on deontic concepts and grounded in a semantic language. The pervasive computing environments under consideration are those in which people and devices are mobile and use various wireless networking technologies to discover and access services and devices in their vicinity. Such pervasive environments lend themselves to policy-based security due to their extremely dynamic nature. Using policies allows the security functionality to be modified without changing the implementation of the entities involved. However, along with being extremely dynamic, these environments also tend to span several domains and be made up of entities of varied capabilities. A policy language for environments of this sort needs to be very expressive but lightweight and easily extensible. We demonstrate the feasibility of our policy language in pervasive environments through a prototype used as part of a secure pervasive system.

602 citations

Patent
25 Oct 2006
TL;DR: In this paper, the authors propose a method for providing access to a computing environment that includes the step of receiving a request from a client system for an enumeration of available computing environments.
Abstract: A method for providing access to a computing environment includes the step of receiving a request from a client system for an enumeration of available computing environments. Collected data regarding available computing environments are accessed. Accessed data are transmitted to a client system, the accessed data indicating to the client system each computing environment available to a user of the client system. A request is received from the client system to access one of the computing environments. A connection is established between the client system and a virtual machine hosting the requested computing environment via a terminal services session, the virtual machine executed by a hypervisor executing in the terminal services session provided by an operating system executing on one of a plurality of execution machines.

499 citations

Journal ArticleDOI
TL;DR: This paper distill from the experience in developing MASs to clearly define a generic MAS infrastructure as the domain independent and reusable substratum that supports the agents' social interactions and shows that the MAS infrastructure imposes requirements on an individual agent.
Abstract: RETSINA is an implemented Multi-Agent System infrastructure that has been developed for several years and applied in many domains ranging from financial portfolio management to logistic planning. In this paper, we distill from our experience in developing MASs to clearly define a generic MAS infrastructure as the domain independent and reusable substratum that supports the agents' social interactions. In addition, we show that the MAS infrastructure imposes requirements on an individual agent if the agent is to be a member of a MAS and take advantage of various components of the MAS infrastructure. Although agents are expected to enter a MAS and seamlessly and effortlessly interact with the agents in the MAS infrastructure, the current state of the art demands agents to be programmed with the knowledge of what infrastructure they will utilize, and what are various fall-back and recovery mechanisms that the infrastructure provides. By providing an abstract MAS infrastructure model and a concrete implemented instance of the model, RETSINA, we contribute towards the development of principles and practice to make the MAS infrastructure “invisible” and ubiquitous to the interacting agents.

473 citations

Proceedings ArticleDOI
19 May 2003
TL;DR: This work advocates a novel approach to grid computing that is based on a combination of "classic" operating system level virtual machines (VMs) and middleware mechanisms to manage VMs in a distributed environment.
Abstract: We advocate a novel approach to grid computing that is based on a combination of "classic" operating system level virtual machines (VMs) and middleware mechanisms to manage VMs in a distributed environment. The abstraction is that of dynamically instantiated and mobile VMs that are a combination of traditional OS processes (the VM monitors) and files (the VM state). We give qualitative arguments that justify our approach in terms of security, isolation, customization, legacy support and resource control, and we show quantitative results that demonstrate the feasibility of our approach front a performance perspective. Finally, we describe the middleware challenges implied by the approach and an architecture for grid computing using virtual machines.

458 citations