Programming languages for distributed applications
New Generation Computing
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
A Framework to Protect Mobile Agents by Using Reference States
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
A framework for secure execution of software
International Journal of Information Security
A security protocol for mobile agents based upon the cooperation of sedentary agents
Journal of Network and Computer Applications
Protection of a mobile agent with a reference clone
Computer Communications
Secure brokerage mechanisms for mobile electronic commerce
Computer Communications
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Countermeasures for mobile agent security
Computer Communications
Hi-index | 0.00 |
Mobile agents are software entities consisting of code, data, state and itinerary that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In particular, collusion attacks have been barely studied in the literature. This paper presents a mechanism that avoids collusion attacks based on code passing. Our proposal is based on a Multi-Code agent, which contains a different variant of the code for each host. A Trusted Third Party is responsible for providing the information to extract its own variant to the hosts, and for taking trusted timestamps that will be used to verify time coherence.