How to share a secret with cheaters
Journal of Cryptology
How to avoid the cheaters succeeding in the key sharing scheme
Designs, Codes and Cryptography
Mobile agents and the future of the internet
ACM SIGOPS Operating Systems Review
Password authentication with insecure communication
Communications of the ACM
Communications of the ACM
Providing Reliable Agents for Electronic Commerce
TREC '98 Proceedings of the International IFIP/GI Working Conference on Trends in Distributed Systems for Electronic Commerce
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Observations on Non-repudiation
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Concordia: An Infrastructure for Collaborating Mobile Agents
MA '97 Proceedings of the First International Workshop on Mobile Agents
Ensuring the Integrity of Agent-Based Computations by Short Proofs
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Security in mobile agent systems
Security in mobile agent systems
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Implementation of Secure Architectures for Mobile Agents in MARISM-A
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
Securing dynamic itineraries for mobile agent applications
Journal of Network and Computer Applications
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Secure itineraries framework for mobile agent systems
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Hi-index | 0.00 |
Mobile agents are processes which can autonomously migrate from host to host. The migration path followed by an agent can be abstracted for programming convenience into an itinerary. This is composed of tuples of the form (server name, method specification). A flexible structure of itinerary is specified in [24] using sequence, alternative and set entries.Despite its many practical benefits, mobile agent technology creates significant new security threats from malicious agents and hosts. In order to protect mobile agents, several itinerary protection protocols have been presented. However, they can only be applied to sequence entries.In this paper, we introduce a protocol for each kind of entry in order to protect general flexible itineraries established in free-roaming mobile agents. Our proposal uses ElGamal cryptosystem and a public-key infrastructure. Nevertheless, any public cryptosystem may be used.