SOSP '87 Proceedings of the eleventh ACM Symposium on Operating systems principles
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Simple forward-secure signatures from any signature scheme
Proceedings of the 7th ACM conference on Computer and communications security
Security in the Ajanta mobile agent system
Software—Practice & Experience
Secure Internet programming: security issues for mobile and distributed objects
Secure Internet programming: security issues for mobile and distributed objects
Java Language Specification, Second Edition: The Java Series
Java Language Specification, Second Edition: The Java Series
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
One-Round Secure Computation and Secure Autonomous Mobile Agents
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Forward-Secure Digital Signature Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
On the (Im)possibility of Obfuscating Programs
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Forward-Secure Signatures with Optimal Signing and Verifying
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
A New Forward-Secure Digital Signature Scheme
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Concepts and Architecture of a Security-Centric Mobile Agent Server
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
Security in the Sanctuary System
Security in the Sanctuary System
Trusting trusted hardware: towards a formal model for programmable secure coprocessors
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Forward-security in private-key cryptography
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Protecting mobile agents from external replay attacks
Journal of Systems and Software
A security-aware metamodel for multi-agent systems (MAS)
Information and Software Technology
Generic modelling of security awareness in agent based systems
Information Sciences: an International Journal
Hi-index | 0.00 |
Remotely executing mobile code introduces a plethora ofsecurity problems. This paper examines the "external agentreplay" attack, identifies the notion of one-way programstate transitions, describes the use of monotonic variablesas a practical method for detecting these attacks, examinesthe more general problem state modification attacks, and introducesthe use of "results verification vectors" to protectagents from attack.