Abstract
New approaches for distributed computing based on mobile agent technology, such as Java, Telescript, or Agent Tel become ever more pervasive. Typical applications of mobile agents in the domain of electronic commerce are agents that roam the Internet in search of services for their owners. The question of how to protect agent platforms from malicious agents is extensively being tackled. The reverse problem of how to protect mobile agents and the potentially confidential information they contain from malicious platforms is largely ignored.
Research supported by a grant from the EPFL (“Privacy” project) and by the Swiss National Science Foundation as part of the SPP-IuK (project number 5003-045364).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
U. G. Wilhelm, L. Buttyàn, and S. Staamann. On the problem of trust in mobile agent systems. In Symposium on Network and Distributed System Security, pages 114–124. Internet Society, March 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wilhelm, U.G., Staamann, S., Buttyán, L. (1998). Protecting the Itinerary of Mobile Agents. In: Demeyer, S., Bosch, J. (eds) Object-Oriented Technology: ECOOP’98 Workshop Reader. ECOOP 1998. Lecture Notes in Computer Science, vol 1543. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49255-0_79
Download citation
DOI: https://doi.org/10.1007/3-540-49255-0_79
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65460-5
Online ISBN: 978-3-540-49255-9
eBook Packages: Springer Book Archive