Skip to main content
Log in

Mobile agents and intellectual property protection

  • Published:
Personal Technologies Aims and scope Submit manuscript

Abstract

Technical enforcemment of intellectual property (IP) rights often conflicts with the ability to use the IP. This is especially true when the IP is data, which may eaisly be copied while it is being accessed. As electronic commerce of data becomes more widespread, traditional approaches will prove increasingly problematic. In this paper, we show that the mobile agent architecture is an ideal solution to this dilemma: by providing full access to the data but charging for the transmission of results back to the user-reslts-based billing-we resulve the access versus protection conflict. We define new requirements for agent frameworks to implement results-based billing: “data-aware accounting” and “data-tight sandboxing”, which, along with the common requirements such as authentication, authorisation, agen self-monitoring, and efficiency, provide the mechanisms by which database owners can effectively grant users access to their intellectual property.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Meidanis J, Setubal JC. Introduction to computational molecular biology. PWS Publishing Co, Boston, MA 1998; 8

    Google Scholar 

  2. Hursch CJ, Hursch JL. SQL: the structured query language Tab Books, ACM CR 8812-0907, 1988

  3. Yee BS. Using secure coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, May 1994. CMU-CS-94-149

  4. Cox IJ, Killian J, Leighton T, Shamoon T. A secure, robust watermark for multimedia. In: International Workshop on Information Hiding. Newton Institute, University of Cambridge, May 1996

  5. Harrison CG, Chess DM, Kershenbaum A. Mobile Agents: are they a good idea? Lecture Notes in Computer Science Springer, Berlin Heidelberg New York, 1997; 1222: 25–47

    Google Scholar 

  6. Anderson R. Stretching the limits of steganography, (Lecture Notes in Computer Science 1174) Springer, Berlin Heidelberg New York, 1996; 39–48

    Google Scholar 

  7. Hohlfeld M, Yee BS. How to migrate agents. Technical Report CS98-588, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, June 1998

    Google Scholar 

  8. Lampson B. A note on the confinement problem. Commun ACM, Oct 1973; 613–615

  9. Yee BS. A sanctuary for mobile agents. Technical Report CS97-537, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, April 1997

    Google Scholar 

  10. White JE. Mobile agents. In: Bradshaw J (ed), Sofware agents. AAAI Press and MIT Press, Cambridge, MA, 1996

    Google Scholar 

  11. McKusick MK, Bostic K, Karels MJ. The design and implementation of the 4. 4 BSD UNIX operating system. Addison-Wesley, New York, 1996

    Google Scholar 

  12. Belmon S, Namprempre C, Onishi K, Ozev S, Seng J. Mobile agents and the intellectual property of data, Technical Report CS98-573, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, February 1998

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bennet S. Yee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Belmon, S.G., Yee, B.S. Mobile agents and intellectual property protection. Personal Technologies 2, 85–91 (1998). https://doi.org/10.1007/BF01324938

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01324938

Keywords

Navigation