Exploring Data Integrity Protection in SAgent

نویسندگان

  • Vandana Gunupudi
  • Stephen R. Tate
چکیده

In this paper we show how agent data integrity protections can be provided in SAgent, which is a security framework designed for comprehensive protection of mobile agents in JADE. While SAgent was designed for comprehensive security protocols with different design and interaction criteria, we show how efficient integrity-only protections can be seamlessly integrated into SAgent. In situations where the more challenging problem of working with secret data on remote hosts is not needed, these integrity protection techniques provide significantly better performance than the comprehensive protections, as we demonstrate through a series of experiments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

1 Reasoning about Message Integrity 1 Rajashekar

We propose an approach for reasoning about message integrity protection in cryptographic protocols. The set of axioms presented herein relate design parameters and assumptions of message integrity protection mechanisms to generic message integrity threats. Comparison of threat properties derived using these axioms with the policy goals for integrity protection aids in assessing the strength (or...

متن کامل

Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage

Cloud storage has a long string of merits but at the same time, poses many challenges on data integrity and privacy. A cloud data auditing protocol, which enables a cloud server to prove the integrity of stored files to a verifier, is a powerful tool for secure cloud storage. Wang et al. proposed a privacy-preserving public auditing protocol, however, Worku et al. found the protocol is seriousl...

متن کامل

Reasoning about Message Integrity

We propose an approach for reasoning about message integrity protection in cryptographic protocols. The set of axioms presented herein relate design parameters and assumptions of message integrity protection mechanisms to generic message integrity threats. Comparison of threat properties derived using these axioms with the policy goals for integrity protection aids in assessing the strength (or...

متن کامل

An Approach to full User Data Integrity Protection in UMTS Access Networks

During development of the UMTS security standard, 3GPP had to take various constraining aspects, like bandwidth and limited hardware, into account, so there were compromises made in security. One such compromise is the absence of a full userdata integrity protection mechanism. In this paper an approach is made to a full user data integrity protection mechanism in the UMTS access network. The cu...

متن کامل

Error bound optimization using second order cone programming

In safety of life applications using satellite navigation, the Protection Level (PL) equation translates what is known about the pseudorange errors into a hard bound on the positioning error (the Protection Level). The current PL equations for Satellite Based Augmentation Systems are based on Gaussian statistics: all errors are characterized by a zero mean Gaussian distribution which is an uppe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006