Abstract
In this article, we submit and compare two different but complementary approaches to the problem of protecting mobile agents in untrusted computing environments. The first alternative, a technique for protection of mobile agents built upon an asymmetric cryptographic system resistant to conventional cryptoanalysis techniques, is based on the application of one-time keys. The second solution, geared towards computing environments supporting public-key cryptographic systems, permits the simultaneous protection of the code and data areas of mobile agents that travel in an information network. This latter protection mechanism can be implemented using any asymmetric cryptosystem.We believe the protection strategies we have developed in our investigation are the first complete solution for the protection of mobile agents in distributed computing environments.
- T. Dierks and C. Allen. The TLS protocol: Version 1.0. Request for Comments, (2246):1--80, January 1999.]] Google ScholarDigital Library
- P. W. L. Fong and R. D. Cameron. Proof linking: An architecture for modular verification of dynamically-linked mobile code. In Proceedings of the ACM SIGSOFT sixth international symposium on Foundations of software engineering, pages 222--230, 1998.]] Google ScholarDigital Library
- F. Hohl. An approach to solve the problem of malicious hosts in mobile agents systems. Institute of Parallel and Distributed High-Performance Systems (IPVR), University of Stuttgart, Germany, 1997(03):1--13, March 1997.]]Google Scholar
- K. Neuenhofen and M. Thompson. A secure marketplace for mobile java agents. In Proceedings of the second international conference on Autonomous Agents, Minneapolis MN USA, pages 212--218, May 1998.]] Google ScholarDigital Library
- L. C. Paulson. Inductive analysis of the Internet protocol TLS. ACM Transactions on Information and System Security, 2(3):332--351, August 1999.]] Google ScholarDigital Library
- J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. In Principles of Programming Languages (POPL) 99 San Antonio Texas USA, pages 93--104, 1999.]] Google Scholar
- D. M. Ritchie. On the Security of UNIX. Unix Programmer's Manual. A. G. Hume and M. D. McIlroy, AT&T Bell Laboratories, Murray Hill, N. J., June 1977.]]Google Scholar
- D. Rodríguez and I. Sobrado. A Public-key based Information Management Model for Mobile Agents. Available in arXiv:cs.CR/0010013, http://xxx.lanl.gov/abs/cs.CR/0010013, October 2000.]]Google Scholar
- T. Sander and C. F. Tschudin. Towards mobile cryptography. International Computer Science Institute (ICSI) Technical Report, 97(049):1--14, November 1997.]]Google Scholar
- T. Sander and C. F. Tschudin. Protecting mobile agents against malicious hosts. Lecture Notes in Computer Science (LNCS), Springer-Verlag Inc., New York, NY, USA, 1419, June 1998.]] Google ScholarDigital Library
- I. Sobrado. A One-Time Pad based Cipher for Data Protection in Distributed Environments. Available in arXiv:cs.CR/0005026, http://xxx.lanl.gov/abs/cs.CR/0005026, May 2000.]]Google Scholar
- C. Tschudin. Mobile agent security. In Intelligent Information Agents -- Agent based information discovery and management on the Internet, Springer, pages 431--445, 1999.]]Google Scholar
- B. S. Yee. A sanctuary for mobile agents. In Secure Internet Programming, LNCS 1603, Springer-Verlag, pages 261--274, 1999.]] Google Scholar
- P. R. Zimmermann. Cryptography for the Internet. Scientific American, 279(4):82--87, October 1998.]]Google ScholarCross Ref
Index Terms
- Evaluation of two security schemes for mobile agents
Recommendations
Evaluation of two security schemes for mobile agents
SIGCOMM LA '01: Workshop on Data communication in Latin America and the CaribbeanIn this article, we submit and compare two different but complementary approaches to the problem of protecting mobile agents in untrusted computing environments. The first alternative, a technique for protection of mobile agents built upon an asymmetric ...
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
A ( t , n ) threshold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t - 1 or less of them cannot ...
Identity-based undetachable digital signature for mobile agents in electronic commerce
To enable mobile agents signing securely on potentially malicious hosts in electronic commerce and other applications, we proposed the definition and security notion of identity-based undetachable digital signature schemes. More importantly, we proposed ...
Comments