Abstract
Technical enforcement of intellectual property (IP) rights often conflicts with the ability to use the IP. This is especially true when the IP is data, which may easily be copied while it is being accessed. As electronic commerce of data becomes more widespread, traditional approaches will prove increasingly problematic. In this paper, we show that the mobile agent architecture is an ideal solution to this dilemma: by providing full access to the data but charging for the transmission of results back to the user — results-based billing — we resolve the access versus protection conflict. We define new requirements for agent frameworks to implement results-based billing: “data-aware accounting” and “data-tight sandboxing”, which, along with the common requirements such as authentication, authorization, agent self-monitoring, and efficiency, provide the mechanisms by which database owners can effectively grant users access to their intellectual property.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
Ross Anderson. Stretching the limits of steganography. Lecture Notes in Computer Science, 1174:39–48, 1996.
Stephane Belmon, Chanathip Namprempre, Kenji Onishi, Sule Ozev, and John Seng. Mobile agents and the intellectual property of data. Technical Report CS98-573, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, February 1998.
Ingemar J. Cox, Joe Killian, Tom Leighton, and Talal Shamoon. A secure, robust watermark for multimedia. In International Workshop on Information Hiding. Newton Institute, University of Cambridge, May 1996.
Colin G. Harrison, David M. Chess, and Aaron Kershenbaum. Mobile agents: Are they a good idea? Lecture Notes in Computer Science, 1222:25–47, 1997.
Matthew Hohlfeld and Bennet S. Yee. How to migrate agents. Technical Report CS98-588, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, June 1998.
C. J. Hursch and J. L. Hursch. SQL: The Structured Query Language. Tab Books; ACM CR 8812-0907, 1988.
B. Lampson. A note on the confinement problem. In Communications of the ACM, pages 613–615. ACM, October 1973.
Marshall K. McKusick, Keith Bostic, and Michael J. Karels. The Design and Implementation of the 4.4 BSD UNIX Operating System. Addison-Wesley, 1996.
Joao Meidanis and Joao Carlos Setubal. Introduction to Computational Molecular Biology, chapter 8. PWS Publishing Co., 1996.
J. E. White. Mobile agents. In J. Bradshaw, editor, Software Agents. AAAI Press and MIT Press, 1996.
Bennet S. Yee. Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, May 1994. CMU-CS-94-149.
Bennet S. Yee. A sanctuary for mobile agents. Technical Report CS97-537, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, April 1997.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Belmon, S.G., Yee, B.S. (1998). Mobile agents and intellectual property protection. In: Rothermel, K., Hohl, F. (eds) Mobile Agents. MA 1998. Lecture Notes in Computer Science, vol 1477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0057657
Download citation
DOI: https://doi.org/10.1007/BFb0057657
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64959-5
Online ISBN: 978-3-540-49817-9
eBook Packages: Springer Book Archive