Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Security in the Ajanta mobile agent system
Software—Practice & Experience
Providing Reliable Agents for Electronic Commerce
TREC '98 Proceedings of the International IFIP/GI Working Conference on Trends in Distributed Systems for Electronic Commerce
Protecting General Flexible Itineraries of Mobile Agents
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Concordia: An Infrastructure for Collaborating Mobile Agents
MA '97 Proceedings of the First International Workshop on Mobile Agents
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Iterative Grid-Based Computing Using Mobile Agents
ICPP '02 Proceedings of the 2002 International Conference on Parallel Processing
A configurable mobile agent data protection protocol
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
Analysis of a Free Roaming Agent Result-Truncation Defense Scheme
CEC '04 Proceedings of the IEEE International Conference on E-Commerce Technology
Using Mobile Agents for Object Sharing in P2P Networks
ICICIC '06 Proceedings of the First International Conference on Innovative Computing, Information and Control - Volume 1
Secure Integration of Distributed Medical Data Using Mobile Agents
IEEE Intelligent Systems
Mobile agents for a brokering service in the electronic marketplace
Decision Support Systems
Agent-based distributed data mining: the KDEC scheme
Intelligent information agents
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Protecting mobile agents from external replay attacks
Journal of Systems and Software
Promoting the development of secure mobile agent applications
Journal of Systems and Software
The MP architecture: towards a secure framework for mobile agents
International Journal of Agent-Oriented Software Engineering
Hi-index | 0.00 |
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.