Compilers: principles, techniques, and tools
Compilers: principles, techniques, and tools
Rational function decomposition
ISSAC '91 Proceedings of the 1991 international symposium on Symbolic and algebraic computation
A new privacy homomorphism and applications
Information Processing Letters
Mobile agents
Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Security in mobile agent systems
Security in mobile agent systems
Securing mobile agents through evaluation of encrypted functions
Securing mobile agents through evaluation of encrypted functions
The Use of Encrypted Functions for Mobile Agent Security
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Countermeasures for mobile agent security
Computer Communications
Utilization of intelligent agents for supporting citizens in their access to e-government services
Web Intelligence and Agent Systems
Web Intelligence and Agent Systems
Hi-index | 0.01 |
We propose a security approach for mobile agents, which protects mobile agents from malicious hosts. Our new approach prevents privacy attacks and integrity attacks to mobile agents from malicious hosts. It is an extension of mobile cryptography that removes many problems found in the original ideas of mobile cryptography while preserving most of the benefits. Although the original idea of mobile cryptography allowed direct computations without decryptions on encrypted mobile agents, it did not provide any practical ways of implementation due to the fact that no homomorphic encryption schemes are found for their approach. Our approach provides a practical idea for implementing mobile cryptography by suggesting a hybrid method that mixes a function composition technique and a homomorphic encryption scheme that we have found. Like the original mobile cryptography, our approach will encrypt both code and data including state information in a way that enables direct computation on encrypted data without decryption. We believe that our approach is a viable and practical means to address security problems such as integrity and privacy attacks to mobile agents.