Skip to main content

Mobile agents and intellectual property protection

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1477))

Abstract

Technical enforcement of intellectual property (IP) rights often conflicts with the ability to use the IP. This is especially true when the IP is data, which may easily be copied while it is being accessed. As electronic commerce of data becomes more widespread, traditional approaches will prove increasingly problematic. In this paper, we show that the mobile agent architecture is an ideal solution to this dilemma: by providing full access to the data but charging for the transmission of results back to the user — results-based billing — we resolve the access versus protection conflict. We define new requirements for agent frameworks to implement results-based billing: “data-aware accounting” and “data-tight sandboxing”, which, along with the common requirements such as authentication, authorization, agent self-monitoring, and efficiency, provide the mechanisms by which database owners can effectively grant users access to their intellectual property.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ross Anderson. Stretching the limits of steganography. Lecture Notes in Computer Science, 1174:39–48, 1996.

    Google Scholar 

  2. Stephane Belmon, Chanathip Namprempre, Kenji Onishi, Sule Ozev, and John Seng. Mobile agents and the intellectual property of data. Technical Report CS98-573, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, February 1998.

    Google Scholar 

  3. Ingemar J. Cox, Joe Killian, Tom Leighton, and Talal Shamoon. A secure, robust watermark for multimedia. In International Workshop on Information Hiding. Newton Institute, University of Cambridge, May 1996.

    Google Scholar 

  4. Colin G. Harrison, David M. Chess, and Aaron Kershenbaum. Mobile agents: Are they a good idea? Lecture Notes in Computer Science, 1222:25–47, 1997.

    Google Scholar 

  5. Matthew Hohlfeld and Bennet S. Yee. How to migrate agents. Technical Report CS98-588, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, June 1998.

    Google Scholar 

  6. C. J. Hursch and J. L. Hursch. SQL: The Structured Query Language. Tab Books; ACM CR 8812-0907, 1988.

    Google Scholar 

  7. B. Lampson. A note on the confinement problem. In Communications of the ACM, pages 613–615. ACM, October 1973.

    Google Scholar 

  8. Marshall K. McKusick, Keith Bostic, and Michael J. Karels. The Design and Implementation of the 4.4 BSD UNIX Operating System. Addison-Wesley, 1996.

    Google Scholar 

  9. Joao Meidanis and Joao Carlos Setubal. Introduction to Computational Molecular Biology, chapter 8. PWS Publishing Co., 1996.

    Google Scholar 

  10. J. E. White. Mobile agents. In J. Bradshaw, editor, Software Agents. AAAI Press and MIT Press, 1996.

    Google Scholar 

  11. Bennet S. Yee. Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, May 1994. CMU-CS-94-149.

    Google Scholar 

  12. Bennet S. Yee. A sanctuary for mobile agents. Technical Report CS97-537, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, April 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kurt Rothermel Fritz Hohl

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Belmon, S.G., Yee, B.S. (1998). Mobile agents and intellectual property protection. In: Rothermel, K., Hohl, F. (eds) Mobile Agents. MA 1998. Lecture Notes in Computer Science, vol 1477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0057657

Download citation

  • DOI: https://doi.org/10.1007/BFb0057657

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64959-5

  • Online ISBN: 978-3-540-49817-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics