A novel method to maintain privacy in mobile agent applications

  • Authors:
  • Kun Peng;Ed Dawson;Juanma Gonzalez Nieto;Eiji Okamoto;Javier López

  • Affiliations:
  • Information Security Institute, Queensland University of Technology;Information Security Institute, Queensland University of Technology;Information Security Institute, Queensland University of Technology;Information Security Institute, Queensland University of Technology;Information Security Institute, Queensland University of Technology

  • Venue:
  • CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privacy in mobile agent applications. It is illustrated that privacy through DCSC is more suitable in mobile agent applications. To support this conclusion, privacy is concretely implemented in a bidding mobile agent scheme in this paper. Success of this example demonstrates that privacy can be practically achieved in mobile agent applications through DCSC without compromising the advantage of mobile agent.