Mobile agents integrity for electronic commerce applications
Information Systems - Special issue on information systems support for electronic commerce
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Dynamic Virtual Organizations, or Not So Dynamic?
BASYS '02 Proceedings of the IFIP TC5/WG5.3 Fifth IFIP/IEEE International Conference on Information Technology for Balanced Automation Systems in Manufacturing and Services: Knowledge and Technology Integration in Production and Services: Balancing Knowledge in Product and Service Life Cycle
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Non-Interactive CryptoComputing For NC1
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Cryptographic Security for Mobile Code
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Security in mobile agent systems
Security in mobile agent systems
A security architecture for survivability mechanisms
A security architecture for survivability mechanisms
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
The paradigm of mobile agents may be used in large-scale distributed systems due to its flexibility that comes from the mobility notion. However, this promising technology brings some security concerns of its own. This paper focuses on mechanisms of the Mobile Agent Security Scheme - MASS - for protecting mobile agents against malicious platforms by considering large-scale systems. This proposed scheme, based on secure data repositories, comprises prevention and detection cryptographic protocols of agent security violation. The scheme is based on the SPKI/SDSI infrastructure and on the concept of SPKI Federation for providing scalability and flexibility to the distributed applications on the Internet. In addition, it proposes an approach on how trust building in mobile agent-based architectures can be reinforced by the use of security mechanisms in the search and select of partners for creating a Virtual Enterprise. A prototype of the MASS was implemented and integrated in order to demonstrate its suitability for a distributed application with mobile agents (MobiCII system).