Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
First international workshop, AOSE 2000 on Agent-oriented software engineering
Apoptosis — the programmed death of distributed services
Secure Internet programming
A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
Towards a Secure Agent Platform Based on FIPA
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
SITA: Protecting Internet Trade Agents from Malicious Hosts
MATA '01 Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications
Secure Client Agent Environment (SCAE) for World Wide Web
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Secure Communication for Secure Agent-Based Electronic Commerce Applications
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Secure Mobile Agent Digital Signatures with Proxy Certificates
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
The Illegal Copy Protection Using Hidden Agent
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Mobile Agent Route Protection through Hash-Based Mechanisms
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Protection of Software-Based Survivability Mechanisms
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Security Requirements for Management Systems Using Mobile Agents
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
A Secure Mobile Agent System Model Based on Extended Elementary Object System
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
Proceedings of the first ACM workshop on Scalable trusted computing
Locating and Repairing Faults in a Network with Mobile Agents
SIROCCO '08 Proceedings of the 15th international colloquium on Structural Information and Communication Complexity
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Live forensics framework for wireless sensor nodes using sandboxing
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Algorithms and theory of computation handbook
Tamper detection marking for object files
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Policy-based authentication for mobile agents
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Searching for black-hole faults in a network using multiple agents
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Distributed security algorithms by mobile agents
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
An improved execution integrity solution for mobile agents
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A design of the flexible mobile agents based on web
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Searching for high-value rare events with uncheatable grid computing
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Securing mobile agents control flow using opaque predicates
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Searching for a black hole in tree networks
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
On the use of opaque predicates in mobile agent code obfuscation
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Hardness and approximation results for black hole search in arbitrary graphs
SIROCCO'05 Proceedings of the 12th international conference on Structural Information and Communication Complexity
A survey of security issue in multi-agent systems
Artificial Intelligence Review
A secure protocol for mobile agents in hostile environment
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
A new protocol for protecting a mobile agent using a reference clone
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Evaluating mobile agent platform security
MATES'06 Proceedings of the 4th German conference on Multiagent System Technologies
Approximation bounds for black hole search problems
OPODIS'05 Proceedings of the 9th international conference on Principles of Distributed Systems
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
Periodic data retrieval problem in rings containing a malicious host
SIROCCO'10 Proceedings of the 17th international conference on Structural Information and Communication Complexity
Higher dependability and security for mobile applications
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Software-Based copy protection for temporal media during dissemination and playback
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Countermeasures for mobile agent security
Computer Communications
Complexity of Searching for a Black Hole
Fundamenta Informaticae
On the concept of software obfuscation in computer security
ISC'07 Proceedings of the 10th international conference on Information Security
Distributed application tamper detection via continuous software updates
Proceedings of the 28th Annual Computer Security Applications Conference
Security Issues in Mobile Agent Applications
International Journal of Agent Technologies and Systems
Self-reliant mobile code: a new direction of agent security
Journal of Network and Computer Applications
Hi-index | 0.01 |
In this paper, an approach to partially solve one of the most difficult aspects of security of mobile agents systems is presented, the problem of malicious hosts. This problem consists in the possibility of attacks against a mobile agent by the party that maintains an agent system node, a host. The idea to solve this problem is to create a blackbox out of an original agent. A blackbox is an agent that performs the same work as the original agent, but is of a different structure. This difference allows to assume a certain agent protection time interval, during which it is impossible for an attacker to discover relevant data or to manipulate the execution of the agent. After that time interval the agent and some associated data get invalid and the agent cannot migrate or interact anymore, which prevents the exploitation of attacks after the protection interval.