Protecting Mobile Agents through Tracing

نویسنده

  • Giovanni Vigna
چکیده

Mobile code systems provide a exible and powerful platform to build distributed applications in an Internet scale, but they rise strong requirements from the security point of view. Security issues include authentication of the di erent remote parties involved and protection of the execution environments from malicious agents. Nonetheless, the most di cult task is to protect roaming agents from execution environments. This paper presents a new mechanism based on execution tracing and cryptography that allows an agent owner to determine if some site in the route followed by the agent tried to tamper with the agent state or code.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cost Evaluation of a Pki-based Security Framework for Mobile Agents

This paper presents a new framework for protecting itinerant mobile agents traveling to potentially hostile execution platforms. The proposed framework extends on an existing mobile code protection technique known as execution tracing. The objective is to create an implementation prototype of a secure mobile agent system that can be easily integrated into existing distributed security architect...

متن کامل

Effect of levels of realism of mobile-based pedagogical agents on health e-learning

Background: One of the ways for effective communication between learners and instructional multimedia content in mobile learning systems is taking advantage of characters or pedagogical agents. The present study aimed to investigate the effect of the levels of realism in mobile-based pedagogical agents on health e-learning. Methods: The s...

متن کامل

Constructing Secure Mobile-Agent-Based Consumer Electronic Applications

This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users’ private ...

متن کامل

A Security Based Model for Mobile Agent Software Systems

Security modeling for agents has been one of the most challenging issues in developing practical mobile agent software systems. In the past, researchers have developed mobile agent systems with emphasis either on protecting mobile agents from malicious hosts or protecting hosts from malicious agents. In this paper, we propose a security based mobile agent system architecture that provides a gen...

متن کامل

D'Agents: Security in a Multiple-Language, Mobile-Agent System

Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we discuss these three issues in the context of D’Agents, a mobile-agent system whose agents can be written in Tcl, Java and Scheme. (D’Agents was formerly known as Agent Tcl.) First we discuss mechanisms existing in D’Agents for pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997