A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Fault-Tolerant Mobile Agent Execution
IEEE Transactions on Computers
Security Modeling and Evaluation for the Mobile Code Paradigm
ASIAN '99 Proceedings of the 5th Asian Computing Science Conference on Advances in Computing Science
A Model of Attacks of Malicious Hosts Against Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Signing, Sealing, and Guarding Java Objects
Mobile Agents and Security
Contemporary Cryptography (Artech House Computer Security Library)
Contemporary Cryptography (Artech House Computer Security Library)
Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
Hi-index | 0.00 |
Mobile Agents (MAs) are not fully adopted for implementing distributed system especially in e-commerce application. The main reason is the security issues associated with use of MAs. Providing integrity of execution is considered as the most challenging problem in MAs. Mobile agent Graph Head Sealing (MAGHS) is a technique that aims towards providing integrity of execution. This paper discusses the attacks that can be launched against MAGHS technique and how the security properties for MAs data integrity are fulfilled. We try to model the behavior of a malicious host by launching a series of passive attacks against mobile agent and then see to what extent the security properties for mobile agent can be achieved. The experimental results suggest that MAGHS framework can be used to protect the computations results of mobile agents.