Skip to main content

Protecting the Itinerary of Mobile Agents

  • Conference paper
  • First Online:
Object-Oriented Technology: ECOOP’98 Workshop Reader (ECOOP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1543))

Included in the following conference series:

Abstract

New approaches for distributed computing based on mobile agent technology, such as Java, Telescript, or Agent Tel become ever more pervasive. Typical applications of mobile agents in the domain of electronic commerce are agents that roam the Internet in search of services for their owners. The question of how to protect agent platforms from malicious agents is extensively being tackled. The reverse problem of how to protect mobile agents and the potentially confidential information they contain from malicious platforms is largely ignored.

Research supported by a grant from the EPFL (“Privacy” project) and by the Swiss National Science Foundation as part of the SPP-IuK (project number 5003-045364).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. U. G. Wilhelm, L. Buttyàn, and S. Staamann. On the problem of trust in mobile agent systems. In Symposium on Network and Distributed System Security, pages 114–124. Internet Society, March 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wilhelm, U.G., Staamann, S., Buttyán, L. (1998). Protecting the Itinerary of Mobile Agents. In: Demeyer, S., Bosch, J. (eds) Object-Oriented Technology: ECOOP’98 Workshop Reader. ECOOP 1998. Lecture Notes in Computer Science, vol 1543. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49255-0_79

Download citation

  • DOI: https://doi.org/10.1007/3-540-49255-0_79

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65460-5

  • Online ISBN: 978-3-540-49255-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics