Cryptographic support for fault-tolerant distributed computing
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Protecting Mobile Web-Commerce Agents with Smartcards
ASAMA '99 Proceedings of the First International Symposium on Agent Systems and Applications Third International Symposium on Mobile Agents
POM - A Mobile Agent Security Model against Malicious Hosts
HPC '00 Proceedings of the The Fourth International Conference on High-Performance Computing in the Asia-Pacific Region-Volume 2 - Volume 2
Information Sciences: an International Journal
Hi-index | 0.00 |
In this paper, a solution to the Problem of Malicious Hosts. named SPMH, is suggested. At first, Mobile Agent Blackbox Construction Method based on Loureiro's Protocol (MABCM-LP) is suggested to convert a mobile agent into a Mobile Agent Blackbox (MAB) which makes the mobile agent difficult to be understood and tampered by malicious hosts. At the same time, a Protocol Tracing the Inputs/outputs and Results (PTIR) is developed to trace the mobile agent running at a host, which can be used to detect and prove the attacks by malicious hosts. It is proved that this solution is secure, correct, and robust. It is found firstly that the detection method and the prevention method are complementary to each other, and this is the first solution that integrated both of these two methods too.