A secure marketplace for mobile Java agents
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Proof linking: an architecture for modular verification of dynamically-linked mobile code
SIGSOFT '98/FSE-6 Proceedings of the 6th ACM SIGSOFT international symposium on Foundations of software engineering
Trust and partial typing in open systems of mobile agents
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Inductive analysis of the Internet protocol TLS
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
In this article, we submit and compare two different but complementary approaches to the problem of protecting mobile agents in untrusted computing environments. The first alternative, a technique for protection of mobile agents built upon an asymmetric cryptographic system resistant to conventional cryptoanalysis techniques, is based on the application of one-time keys. The second solution, geared towards computing environments supporting public-key cryptographic systems, permits the simultaneous protection of the code and data areas of mobile agents that travel in an information network. This latter protection mechanism can be implemented using any asymmetric cryptosystem.We believe the protection strategies we have developed in our investigation are the first complete solution for the protection of mobile agents in distributed computing environments.