Abstract
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and operations on mutually supporting agents which migrate in disjunct host domains. In order to attack agents, hosts must collude/conspire across domains. Proper selection of itineraries can minimize the risk of such coalitions being formed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A. he role of trust management in distributed systems security. In Secure Internet Programming [14].
Chess, D., Grosof, B., Harrison, C, Levine, D., Parris, C, and Tsudik, G. Itinerant agents for mobile computing. IEEE Personal Communications (October 1995), 34–49.
Karjoth, G., Asokan, N., and Gülcü, C. Protecting the computation results of free-roaming agents. In Mobile Agents (MA’ 98), vol. 1477 of Lecture Notes in Computer Science. Springer Verlag, Berlin Heidelberg, September 1998, pp. 1–14.
Riordan, J., and Schneier, B. Environmental key generation towards clueless agents. In Mobile Agents and Security [13], pp. 15–24.
Roth, V., and Jalali, M. Access control and key management for mobile agents. Computers & Graphics 22,3 (1998). Special issue Data Security in Image Communication and Networks.
Sander, T., and Tschudin, C. F. Protecting mobile agents against malicious hosts. In Mobile Agents and Security [13], pp. 44–60.
Schneier, B.Applied Cryptography, 1 ed. John Wiley & Sons, Inc., 1994, section 6.7, pp. 120–122. Digital Cash Protocol #4.
Shimshon Berkovits, Joshua D. Guttman, V. S. Authentication for mobile agents. In Mobile Agents and Security [13], pp. 114–136.
Swarup, V. Trust Appraisal and Secure Routing of Mobile Agents. DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, March 1997. Position Paper.
Swarup, V., and Fabrega, J. T. Understanding trust. In Secure Internet Programming [14].
Tschudin, C. Apoptosis — the programmed death of distributed services. In Secure Internet Programming [14].
Vigna, G. Cryptographic traces for mobile agents. In Mobile Agents and Security [13], pp. 137–153.
Vigna, G.Mobile Agents and Security, vol. 1419 of Lecture Notes in Computer Science. Springer Verlag, Berlin Heidelberg, 1998.
Vitek, J., and Jensen, C.Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Lecture Notes in Computer Science. Springer-Verlag Inc., New York, NY, USA, 1999.
Yee, B. S. A sanctuary for mobile agents. In Secure Internet Programming [14].
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Roth, V. (1999). Mutual Protection of Co-operating Agents. In: Vitek, J., Jensen, C.D. (eds) Secure Internet Programming. Lecture Notes in Computer Science, vol 1603. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48749-2_13
Download citation
DOI: https://doi.org/10.1007/3-540-48749-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66130-6
Online ISBN: 978-3-540-48749-4
eBook Packages: Springer Book Archive