NOMADS: toward a strong and safe mobile agent system
AGENTS '00 Proceedings of the fourth international conference on Autonomous agents
Security in the Ajanta mobile agent system
Software—Practice & Experience
MARS: A Programmable Coordination Architecture for Mobile Agents
IEEE Internet Computing
IEEE Internet Computing
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
A Framework to Protect Mobile Agents by Using Reference States
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
A Framework for Tamper Detection Marking of Mobile Applications
ISSRE '03 Proceedings of the 14th International Symposium on Software Reliability Engineering
Countering Security Vulnerabilities in Agent Execution Using a Self Executing Security Examination
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3
SELinux: NSA's Open Source Security Enhanced Linux
SELinux: NSA's Open Source Security Enhanced Linux
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Intrusion detection with mobile agents
Computer Communications
Securing mobile agents for crisis management support
Proceedings of the seventh ACM workshop on Scalable trusted computing
Hi-index | 0.00 |
Mobile agent systems of the future will be used for secure information delivery and retrieval, off-line searching and purchasing, and even system software updates. As part of such applications, agent and platform integrity must be maintained, confidentiality between agents and the intended platform parties must be preserved, and accountability of agents and their platform counterparts must be stringent. SMASH, Secure Modular Mobile Agent System.H, is an agent system designed using modular components that allow agents to be easily constructed and the system to be easily extended. To facilitate security functionality, the SMASH platform incorporates existing hardware and software security solutions to provide access control, accountability, and integrity. Agents are further protected using a series of standard cryptographic functions. While SMASH promotes high assurance applications, the system also promotes an open network environment, permitting agents to move freely among the platforms and execute unprivileged actions without authenticating. In this paper, we elaborate on the components and capabilities of SMASH and present an application that benefits from each of these elements.