Skip to main content

Mutual Protection of Co-operating Agents

  • Chapter
Secure Internet Programming

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1603))

  • 593 Accesses

Abstract

Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and operations on mutually supporting agents which migrate in disjunct host domains. In order to attack agents, hosts must collude/conspire across domains. Proper selection of itineraries can minimize the risk of such coalitions being formed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A. he role of trust management in distributed systems security. In Secure Internet Programming [14].

    Google Scholar 

  2. Chess, D., Grosof, B., Harrison, C, Levine, D., Parris, C, and Tsudik, G. Itinerant agents for mobile computing. IEEE Personal Communications (October 1995), 34–49.

    Google Scholar 

  3. Karjoth, G., Asokan, N., and Gülcü, C. Protecting the computation results of free-roaming agents. In Mobile Agents (MA’ 98), vol. 1477 of Lecture Notes in Computer Science. Springer Verlag, Berlin Heidelberg, September 1998, pp. 1–14.

    Chapter  Google Scholar 

  4. Riordan, J., and Schneier, B. Environmental key generation towards clueless agents. In Mobile Agents and Security [13], pp. 15–24.

    Chapter  Google Scholar 

  5. Roth, V., and Jalali, M. Access control and key management for mobile agents. Computers & Graphics 22,3 (1998). Special issue Data Security in Image Communication and Networks.

    Google Scholar 

  6. Sander, T., and Tschudin, C. F. Protecting mobile agents against malicious hosts. In Mobile Agents and Security [13], pp. 44–60.

    Chapter  Google Scholar 

  7. Schneier, B.Applied Cryptography, 1 ed. John Wiley & Sons, Inc., 1994, section 6.7, pp. 120–122. Digital Cash Protocol #4.

    Google Scholar 

  8. Shimshon Berkovits, Joshua D. Guttman, V. S. Authentication for mobile agents. In Mobile Agents and Security [13], pp. 114–136.

    Chapter  Google Scholar 

  9. Swarup, V. Trust Appraisal and Secure Routing of Mobile Agents. DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, March 1997. Position Paper.

    Google Scholar 

  10. Swarup, V., and Fabrega, J. T. Understanding trust. In Secure Internet Programming [14].

    Google Scholar 

  11. Tschudin, C. Apoptosis — the programmed death of distributed services. In Secure Internet Programming [14].

    Google Scholar 

  12. Vigna, G. Cryptographic traces for mobile agents. In Mobile Agents and Security [13], pp. 137–153.

    Chapter  Google Scholar 

  13. Vigna, G.Mobile Agents and Security, vol. 1419 of Lecture Notes in Computer Science. Springer Verlag, Berlin Heidelberg, 1998.

    Google Scholar 

  14. Vitek, J., and Jensen, C.Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Lecture Notes in Computer Science. Springer-Verlag Inc., New York, NY, USA, 1999.

    Google Scholar 

  15. Yee, B. S. A sanctuary for mobile agents. In Secure Internet Programming [14].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Roth, V. (1999). Mutual Protection of Co-operating Agents. In: Vitek, J., Jensen, C.D. (eds) Secure Internet Programming. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48749-2_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-48749-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66130-6

  • Online ISBN: 978-3-540-48749-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics