Mobile Agents Protection in the Internet Environment
COMPSAC '99 23rd International Computer Software and Applications Conference
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Secure Information Gathering Agent for Internet Trading
Selected Papers from the 4th Australian Workshop on Distributed Artificial Intelligence, Multi-Agent Systems: Theories, Languages, and Applications
A Security Architecture for Mobile Agents in Ajanta
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Securing dynamic itineraries for mobile agent applications
Journal of Network and Computer Applications
Promoting the development of secure mobile agent applications
Journal of Systems and Software
Using social networks to distort users' profiles generated by web search engines
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mechanisms that, instead of preventing malicious hosts from tampering with the collected data, simply aim at detecting tampering attempts. The various proposals that appeared in the literature so far are characterized by several limitations, some of which have been pointed out recently. In particular, data truncations may not be detected, and a binding of the static code to the collected data is missing. This paper takes into account such criticisms and formally defines a new protocol that does not suffer from all the previous limitations. Such a protocol is also configurable, according to the protection level needed. In this way, the minimum protection level compatible with the needed security properties can be selected each time.