Abstract
Technical enforcemment of intellectual property (IP) rights often conflicts with the ability to use the IP. This is especially true when the IP is data, which may eaisly be copied while it is being accessed. As electronic commerce of data becomes more widespread, traditional approaches will prove increasingly problematic. In this paper, we show that the mobile agent architecture is an ideal solution to this dilemma: by providing full access to the data but charging for the transmission of results back to the user-reslts-based billing-we resulve the access versus protection conflict. We define new requirements for agent frameworks to implement results-based billing: “data-aware accounting” and “data-tight sandboxing”, which, along with the common requirements such as authentication, authorisation, agen self-monitoring, and efficiency, provide the mechanisms by which database owners can effectively grant users access to their intellectual property.
Similar content being viewed by others
References
Meidanis J, Setubal JC. Introduction to computational molecular biology. PWS Publishing Co, Boston, MA 1998; 8
Hursch CJ, Hursch JL. SQL: the structured query language Tab Books, ACM CR 8812-0907, 1988
Yee BS. Using secure coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, May 1994. CMU-CS-94-149
Cox IJ, Killian J, Leighton T, Shamoon T. A secure, robust watermark for multimedia. In: International Workshop on Information Hiding. Newton Institute, University of Cambridge, May 1996
Harrison CG, Chess DM, Kershenbaum A. Mobile Agents: are they a good idea? Lecture Notes in Computer Science Springer, Berlin Heidelberg New York, 1997; 1222: 25–47
Anderson R. Stretching the limits of steganography, (Lecture Notes in Computer Science 1174) Springer, Berlin Heidelberg New York, 1996; 39–48
Hohlfeld M, Yee BS. How to migrate agents. Technical Report CS98-588, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, June 1998
Lampson B. A note on the confinement problem. Commun ACM, Oct 1973; 613–615
Yee BS. A sanctuary for mobile agents. Technical Report CS97-537, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, April 1997
White JE. Mobile agents. In: Bradshaw J (ed), Sofware agents. AAAI Press and MIT Press, Cambridge, MA, 1996
McKusick MK, Bostic K, Karels MJ. The design and implementation of the 4. 4 BSD UNIX operating system. Addison-Wesley, New York, 1996
Belmon S, Namprempre C, Onishi K, Ozev S, Seng J. Mobile agents and the intellectual property of data, Technical Report CS98-573, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, February 1998
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Belmon, S.G., Yee, B.S. Mobile agents and intellectual property protection. Personal Technologies 2, 85–91 (1998). https://doi.org/10.1007/BF01324938
Issue Date:
DOI: https://doi.org/10.1007/BF01324938