A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Hi-index | 0.00 |
In this article we describe an extension of Java Archives that allows to keep data encrypted for multiple recipients. Encrypted data is accessible only by selected access groups. Java archives may be used as containers of mobile agents, which allows agents to keep confidential data unaccessible while residing on untrusted hosts. However, additional protective measures are required in order to prevent Cut & Paste attacks on mobile agents by malicious hosts. One such mechanism is described. The usefulness of the concepts is illustrated by an example application for user profile management in an electronic commerce setting.