Manufacturing cheap, resilient, and stealthy opaque constructs
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Breaking Abstractions and Unstructuring Data Structures
ICCL '98 Proceedings of the 1998 International Conference on Computer Languages
Hi-index | 0.00 |
Mobile Agents are potential candidates for handling applications that are not locale specific. One such important area is e-commerce. Proper security infrastructure and guarantees must be provided before realizing any applications. A vital security aspect is securing the agent from the malicious attacks of the host and other agents where it is executed. This security threat needs to be addressed by mobile agent systems. No comprehensive solution to this problem exists. We present a solution to this problem using a trusted third party in the mobile agent system. This paper proposes multi modular design of agents with separation of semantics to the agent modules under a trusted third party environment and execution of successor modules subject to the safe execution of predecessor modules determined by satisfactory integrity checks by the trusted third party.