Evaluation of two security schemes for mobile agents

  • Authors:
  • Igor Sobrado

  • Affiliations:
  • Universidad de Oviedo, Avda. Calvo Sotelo 18, E-33007, Oviedo (Asturias), Spain

  • Venue:
  • ACM SIGCOMM Computer Communication Review - Workshop on data communication in Latin America and the Caribbean
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this article, we submit and compare two different but complementary approaches to the problem of protecting mobile agents in untrusted computing environments. The first alternative, a technique for protection of mobile agents built upon an asymmetric cryptographic system resistant to conventional cryptoanalysis techniques, is based on the application of one-time keys. The second solution, geared towards computing environments supporting public-key cryptographic systems, permits the simultaneous protection of the code and data areas of mobile agents that travel in an information network. This latter protection mechanism can be implemented using any asymmetric cryptosystem.We believe the protection strategies we have developed in our investigation are the first complete solution for the protection of mobile agents in distributed computing environments.