Empowering mobile software agents

被引:0
|
作者
Roth, V [1 ]
机构
[1] Fraunhofer Inst Comp Graph, Dept Secur Technol, D-64283 Darmstadt, Germany
来源
MOBILE AGENTS, PROCEEDINGS | 2002年 / 2535卷
关键词
mobile agent security; malicious host; protocol interleaving attack; applied cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile agents are vulnerable by means of protocol interleaving attacks. This paper presents equivalent protocols meant to be robust against this type of attack. Moreover, it describes the required processes and data structures at a level of detail that can be translated to an implementation in a straightforward way. Our aim is to demonstrate how cryptographic processing can be implemented transparently for agent programmers, thereby reducing the risks of human error in (secure) mobile agent programming.
引用
收藏
页码:47 / 63
页数:17
相关论文
共 50 条
  • [41] Advanced network management functionalities through the use of mobile software agents
    Puliafito, A
    Tomarchio, O
    INTELLIGENT AGENTS FOR TELECOMMUNICATION APPLICATIONS, 1999, 1699 : 33 - 45
  • [42] Runtime Efficiency of Adaptive Mobile Software Agents in Pervasive Computing Environments
    Gunasekera, Kutila
    Krishnaswamy, Shonali
    Loke, Seng Wai
    Zaslavsky, Arkady
    INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES (ICPS 2009), 2009, : 123 - 131
  • [43] Mobile software agents for Web-based medical image retrieval
    Paranjape, RB
    Smith, KD
    JOURNAL OF TELEMEDICINE AND TELECARE, 2000, 6 : 53 - 55
  • [44] Customizing and Delivering Mobile Services using Software Agents and CC/PP
    Mahmoud, Qusay H.
    Wang, Zhixin
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 1114 - 1118
  • [45] An economic model for medical data retrieval using mobile software agents
    Smith, KD
    Paranjape, RB
    2000 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CONFERENCE PROCEEDINGS, VOLS 1 AND 2: NAVIGATING TO A NEW ERA, 2000, : 230 - 234
  • [46] Novel Monitoring Mechanism for Distributed System Software Using Mobile Agents
    Singh, Rajwinder
    Dave, Mayank
    INTELLIGENT INFORMATICS, 2013, 182 : 383 - +
  • [47] Empowering biomedical discovery with AI agents
    Gao, Shanghua
    Fang, Ada
    Huang, Yepeng
    Giunchiglia, Valentina
    Noori, Ayush
    Schwarz, Jonathan Richard
    Ektefaie, Yasha
    Kondic, Jovana
    Zitnik, Marinka
    CELL, 2024, 187 (22) : 6125 - 6151
  • [48] Mobile technology in microfinance Empowering the unreachable
    Goswami, Shubham
    CHANGING CONTOURS OF MICROFINANCE IN INDIA, 2016, : 54 - 71
  • [49] Empowering the battlefield with a mobile middleware platform
    Jana, R
    Jora, S
    Rice, CW
    Chen, YF
    Hart, L
    Emery, P
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 1337 - 1342
  • [50] OpenRoads: Empowering Research in Mobile Networks
    Yap, Kok-Kiong
    Kobayashi, Masayoshi
    Sherwood, Rob
    Huang, Te-Yuan
    Chan, Michael
    Handigol, Nikhil
    McKeown, Nick
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (01) : 125 - 126