Digital copyright protection
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The grid
Security enhanced mobile agents
Proceedings of the 7th ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Mobile Agents for World Wide Web Distributed Database Access
IEEE Transactions on Knowledge and Data Engineering
Secure Transactions with Mobile Agents in Hostile Environments
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
DEXA '02 Proceedings of the 13th International Workshop on Database and Expert Systems Applications
Dispatching Mobile Agents with Secure Routes in Parallel
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Secure Mobile Agent Digital Signatures with Proxy Certificates
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Grids and grid technologies for wide-area distributed computing
Software—Practice & Experience
Security and robustness enhanced route structures for mobile agents
Mobile Networks and Applications
Business transaction coordination in multi-agent financial web services
International Journal of Web and Grid Services
Hi-index | 0.00 |
In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present a fast binary dispatch model and corresponding secure route structures for mobile agents dispatched in parallel to protect the dispatch routes of agents while ensuring the dispatch efficiency. The fast binary dispatch model is simple but efficient with a dispatch complexity of O(log$_2$n. The secure route structures adopt the combination of public-key encryption and digital signature schemes and expose minimal route information to hosts. The nested structure can help detect attacks as early as possible. We evaluated the various models both analytically and empirically.