skip to main content
article

Evaluation of two security schemes for mobile agents

Authors Info & Claims
Published:01 April 2001Publication History
Skip Abstract Section

Abstract

In this article, we submit and compare two different but complementary approaches to the problem of protecting mobile agents in untrusted computing environments. The first alternative, a technique for protection of mobile agents built upon an asymmetric cryptographic system resistant to conventional cryptoanalysis techniques, is based on the application of one-time keys. The second solution, geared towards computing environments supporting public-key cryptographic systems, permits the simultaneous protection of the code and data areas of mobile agents that travel in an information network. This latter protection mechanism can be implemented using any asymmetric cryptosystem.We believe the protection strategies we have developed in our investigation are the first complete solution for the protection of mobile agents in distributed computing environments.

References

  1. T. Dierks and C. Allen. The TLS protocol: Version 1.0. Request for Comments, (2246):1--80, January 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. W. L. Fong and R. D. Cameron. Proof linking: An architecture for modular verification of dynamically-linked mobile code. In Proceedings of the ACM SIGSOFT sixth international symposium on Foundations of software engineering, pages 222--230, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Hohl. An approach to solve the problem of malicious hosts in mobile agents systems. Institute of Parallel and Distributed High-Performance Systems (IPVR), University of Stuttgart, Germany, 1997(03):1--13, March 1997.]]Google ScholarGoogle Scholar
  4. K. Neuenhofen and M. Thompson. A secure marketplace for mobile java agents. In Proceedings of the second international conference on Autonomous Agents, Minneapolis MN USA, pages 212--218, May 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. C. Paulson. Inductive analysis of the Internet protocol TLS. ACM Transactions on Information and System Security, 2(3):332--351, August 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. In Principles of Programming Languages (POPL) 99 San Antonio Texas USA, pages 93--104, 1999.]] Google ScholarGoogle Scholar
  7. D. M. Ritchie. On the Security of UNIX. Unix Programmer's Manual. A. G. Hume and M. D. McIlroy, AT&T Bell Laboratories, Murray Hill, N. J., June 1977.]]Google ScholarGoogle Scholar
  8. D. Rodríguez and I. Sobrado. A Public-key based Information Management Model for Mobile Agents. Available in arXiv:cs.CR/0010013, http://xxx.lanl.gov/abs/cs.CR/0010013, October 2000.]]Google ScholarGoogle Scholar
  9. T. Sander and C. F. Tschudin. Towards mobile cryptography. International Computer Science Institute (ICSI) Technical Report, 97(049):1--14, November 1997.]]Google ScholarGoogle Scholar
  10. T. Sander and C. F. Tschudin. Protecting mobile agents against malicious hosts. Lecture Notes in Computer Science (LNCS), Springer-Verlag Inc., New York, NY, USA, 1419, June 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. I. Sobrado. A One-Time Pad based Cipher for Data Protection in Distributed Environments. Available in arXiv:cs.CR/0005026, http://xxx.lanl.gov/abs/cs.CR/0005026, May 2000.]]Google ScholarGoogle Scholar
  12. C. Tschudin. Mobile agent security. In Intelligent Information Agents -- Agent based information discovery and management on the Internet, Springer, pages 431--445, 1999.]]Google ScholarGoogle Scholar
  13. B. S. Yee. A sanctuary for mobile agents. In Secure Internet Programming, LNCS 1603, Springer-Verlag, pages 261--274, 1999.]] Google ScholarGoogle Scholar
  14. P. R. Zimmermann. Cryptography for the Internet. Scientific American, 279(4):82--87, October 1998.]]Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Evaluation of two security schemes for mobile agents

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader