Security in the Ajanta mobile agent system
Software—Practice & Experience
Secure Internet programming
Providing Reliable Agents for Electronic Commerce
TREC '98 Proceedings of the International IFIP/GI Working Conference on Trends in Distributed Systems for Electronic Commerce
Mobile Agents Protection in the Internet Environment
COMPSAC '99 23rd International Computer Software and Applications Conference
Protecting General Flexible Itineraries of Mobile Agents
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
Securing dynamic itineraries for mobile agent applications
Journal of Network and Computer Applications
Protecting mobile agents from external replay attacks
Journal of Systems and Software
Hi-index | 0.00 |
A mobile agent's itinerary describes the set of hosts visited during the agent's travel, and must be protected against malicious entities trying to access and/or modify it for their own benefit. Protection mechanisms must be put in place, but we should avoid imposing unnecessary limitations on the agent's ability to choose its itinerary in an as flexible as possible way. In this article, we extend previous work on itinerary protection protocols to include loops among the allowable protected itineraries for roaming agents. Our agents can thus traverse a whole new range of paths in a secure way.