Safe kernel extensions without run-time checking
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
Agent design patterns: elements of agent application design
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Agent-mediated electronic commerce: issues, challenges and some viewpoints
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Seven good reasons for mobile agents
Communications of the ACM
Some thoughts on agent trust and delegation
Proceedings of the fifth international conference on Autonomous agents
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Principles of Trust for MAS: Cognitive Anatomy, Social Importance, and Quantification
ICMAS '98 Proceedings of the 3rd International Conference on Multi Agent Systems
Security in mobile agent systems
Security in mobile agent systems
Countermeasures for mobile agent security
Computer Communications
Security: important issue in e-commerce
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
Trust-enhanced secure mobile agent-based system design
International Journal of Agent-Oriented Software Engineering
Tamper detection marking for object files
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
DualTrust: a distributed trust model for swarm-based autonomic computing systems
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Profile-Based security against malicious mobile agents
ADMA'06 Proceedings of the Second international conference on Advanced Data Mining and Applications
Hi-index | 0.00 |
The problem of protecting mobile code from malicious hosts is an important security issue, for which many solutions have been proposed. We describe a method to adapt an existing technique, execution tracing, to enhance its flexibility in deployment for a large scale mobile agent system. This is achieved through the introduction of a trusted third party, the verification server, which undertakes the verification of execution traces on behalf of the platform launching the agent. The server constructs a certificate that testifies to the capability of a particular host platform to undertake the correct execution of a mobile agent. In this sense, the server assumes a role analogous of a Certificate Authority (CA) in a PKI. We briefly discuss the issues associated with such a framework.