Skip to main content

Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study

  • Conference paper
  • First Online:
Mobile Agents (MA 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2240))

Included in the following conference series:

Abstract

The aim of the work presented in this paper is to check cryptographic protocols for mobile agents against both network intruders and malicious hosts using formal methods. We focus attention on data integrity properties and show how the techniques used for classical message-based protocols such as authentication protocols can be applied to mobile agent systems as well. To illustrate our approach, we use a case study taken from the literature and show how it can be specified and verified using some currently available tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tschudin, C.: Mobile agent security. In Klusch, M., ed.: Intelligent Information Agents: Cooperative, Rational and Adaptive Information Gathering on the Internet. Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany (1999) 431–446

    Google Scholar 

  2. Farmer, W., Guttman, J., Swarup, V.: Security for mobile agents: Issues and requirements. In: Proceedings of the 19th National Information Systems Security Conference, Baltimore, Md. (1996) 591–597

    Google Scholar 

  3. Yee, B.S.: A sanctuary for mobile agents. Technical Report CS97-537, UC San Diego, Department of Computer Science and Engineering (1997)

    Google Scholar 

  4. Vigna, G.: Cryptographic traces for mobile agents. In Vigna, G., ed.: Mobile Agent Security. Lecture Notes in Computer Science No. 1419. Springer-Verlag: Heidelberg, Germany (1998) 137–153

    Chapter  Google Scholar 

  5. Karjoth, G., Asokan, N., Gülcü, C.: Protecting the computation results of freeroaming agents. In Rothermel, K., Hohl, F., eds.: Proceedings of the 2nd International Workshop on Mobile Agents. Volume 1477 of Lecture Notes in Computer Science., Springer-Verlag: Heidelberg, Germany (1998) 195–207

    Chapter  Google Scholar 

  6. Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents integrity in E-commerce applications. In: of the 19th IEEE International Conference on Distributed Computing Systems Workshop (ICDCS’99), Austin, Texas, IEEE Computer Society Press (1999) 59–64

    Google Scholar 

  7. Wang, X.F., Yi, X., Lam, K.Y., Okamoto, E.: Secure information gathering agent for internet trading. In Zhang, C., Lukose, D., eds.: Proceedings of the 4th Australian Workshop on Distributed Artificial Intelligence on Multi-Agent Systems: Theories, Languages, and Applications (DAI-98). Volume 1544 of LNAI., Berlin, Germany, Springer (1998) 183–193

    Google Scholar 

  8. Hoare, C.A.R.: Communications Sequential Processes. Prentice-Hall, Englewood Cliffs (NJ), USA (1985)

    Google Scholar 

  9. Ltd., F.S.E.: Failures-Divergence Refinement. FDR2 User Manual. Available at http://www.formal.demon.co.uk/fdr2manual/index.html (3 May 2000)

  10. Lowe, G.: Casper: A compiler for the analysis of security protocols. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop, IEEE Computer Society Press (1997)

    Google Scholar 

  11. Lowe, G., Roscoe, B.: Using CSP to detect errors in the TMN protocol. IEEE Transactions on Software Engineering 23 (1997) 659–669

    Article  Google Scholar 

  12. Schneider, S.: Verifying authentication protocols with CSP. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop, IEEE Computer Society Press (1997)

    Google Scholar 

  13. Roscoe, A.W.: Modelling and verifying key-exchange protocols using CSP and FDR. In: Proceedings of the Eighth Computer Security Foundations Workshop (CSFW’ 95), Washington-Brussels-Tokyo, IEEE (1995) 98–107

    Google Scholar 

  14. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spicalculus. Research Report 149, Digital Equipment Corporation Systems Research Center (1998) A shortened version of this report appeared in Information and Computation 148(1999):1–70.

    MathSciNet  Google Scholar 

  15. Clarke, E.M., Jha, S., Marrero, W.: Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology 9 (2000) 443–487

    Article  Google Scholar 

  16. Song, D.: Athena: A new efficient automatic checker for security protocol analysis. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW’ 99), Washington-Brussels-Tokyo, IEEE (1999) 192–202

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hannotin, X., Maggi, P., Sisto, R. (2001). Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. In: Picco, G.P. (eds) Mobile Agents. MA 2001. Lecture Notes in Computer Science, vol 2240. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45647-3_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-45647-3_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42952-4

  • Online ISBN: 978-3-540-45647-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics