Seven good reasons for mobile agents
Communications of the ACM
Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Mobile agents and the future of the internet
ACM SIGOPS Operating Systems Review
Simple forward-secure signatures from any signature scheme
Proceedings of the 7th ACM conference on Computer and communications security
Journal of Computer Security
Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Cryptographic support for fault-tolerant distributed computing
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Electronic Payment Systems
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
Secure Transactions with Mobile Agents in Hostile Environments
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Secure Communication for Secure Agent-Based Electronic Commerce Applications
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Model of Attacks of Malicious Hosts Against Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
On Mobile Agent Based Transactions in Moderately Hostile Environments
Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
X-Cash: Executable Digital Cash
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
Ensuring the Integrity of Agent-Based Computations by Short Proofs
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Sliding Encryption: A Cryptographic Tool for Mobile Agents
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
On the Security of Server-Aided RSA Protocols
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Mobile Agents: Are They a Good Idea?
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
A Framework to Protect Mobile Agents by Using Reference States
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Cryptographic Security for Mobile Code
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Countermeasures for mobile agent security
Computer Communications
AEGIS: architecture for tamper-evident and tamper-resistant processing
ICS '03 Proceedings of the 17th annual international conference on Supercomputing
Efficient Memory Integrity Verification and Encryption for Secure Processors
Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture
New analysis on mobile agents based network routing
Design and application of hybrid intelligent systems
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance
IEEE Transactions on Dependable and Secure Computing
Foundations and applications for secure triggers
ACM Transactions on Information and System Security (TISSEC)
A consistent history authentication protocol
ACM SIGSOFT Software Engineering Notes
Journal of Systems Architecture: the EUROMICRO Journal
An XML-based agent model for supporting user activities on the Web
Web Intelligence and Agent Systems
A middleware architecture for privacy protection
Computer Networks: The International Journal of Computer and Telecommunications Networking
On agent technology for e-commerce: trust, security and legal issues
The Knowledge Engineering Review
JGRIM: An approach for easy gridification of applications
Future Generation Computer Systems
Boosting-Based Distributed and Adaptive Security-Monitoring through Agent Collaboration
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
Aegis: A Single-Chip Secure Processor
IEEE Design & Test
A mobile agents-based approach to test the reliability of web services
International Journal of Web and Grid Services
Employ a mobile agent for making a payment
Mobile Information Systems
Host-Based Security Challenges and Controls: A Survey of Contemporary Research
Information Security Journal: A Global Perspective
ODDUGI: Ubiquitous Mobile Agent System
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
New analysis on mobile agents based network routing
Applied Soft Computing
Protecting mobile-agent data collection against blocking attacks
Computer Standards & Interfaces
Intelligent agent based artificial immune system for computer security--a review
Artificial Intelligence Review
Application Security Models for Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
AEGIS: A single-chip secure processor
Information Security Tech. Report
Efficient key management scheme for hierarchical access control in mobile agents
WSEAS TRANSACTIONS on COMMUNICATIONS
Security issues for the use of semantic web in e-commerce
BIS'07 Proceedings of the 10th international conference on Business information systems
Securing code in services oriented architecture
ICWE'07 Proceedings of the 7th international conference on Web engineering
A Mobile Agent-Based Tool Supporting Web Services Testing
Wireless Personal Communications: An International Journal
An attack and repair of secure web transaction protocol for anonymous mobile agents
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
An improved execution integrity solution for mobile agents
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Distribution of mobile agents in vulnerable networks
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
The probability of success of mobile agents when routing in faulty networks
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Proof-carrying proxy certificates
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Statistical behaviors of mobile agents in network routing
The Journal of Supercomputing
A survey on mobile digital signature models
Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business
Hi-index | 0.00 |
This article investigates if and how mobile agents can execute secure electronic transactions on untrusted hosts. An overview of the security issues of mobile agents is first given. The problem of untrusted (i.e., potentially malicious) hosts is one of these issues, and appears to be the most difficult to solve. The current approaches to counter this problem are evaluated, and their relevance for secure electronic transactions is discussed. In particular, a state-of-the-art survey of mobile agent-based secure electronic transactions is presented.