Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Software agents
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Mobile Agents: Are They a Good Idea?
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Secure coprocessors in electronic commerce applications
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Mobile software agents: an overview
IEEE Communications Magazine
Personal trusted devices for web services: revisiting multilevel security
Mobile Networks and Applications - Security in mobile computing environments
Using mobile agents for temporary disconnection from wireless network
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
Ubiquitous collaborative iTrust service: Exploring proximity collective wisdom
Information Systems Frontiers
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
A nested token-based delegation scheme for cascaded delegation in mobile agent environments
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Trustworthy service composition: challenges and research questions
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Hi-index | 0.00 |
The problem of protecting an execution environment from possibly malicious mobile agents has been studied extensively, but the reverse problem, protecting the agent from malicious execution environments, has not. We propose an approach that relies on trusted and tamper-resistant hardware to prevent breaches of trust, rather than correcting them after the fact. We address the question of how to base trust on technical reasoning. We present a pessimistic approach to trust that tries to prevent malicious behavior from occurring in the first place, rather than correcting it after it has occurred