Exploring Data Integrity Protection in SAgent
نویسندگان
چکیده
In this paper we show how agent data integrity protections can be provided in SAgent, which is a security framework designed for comprehensive protection of mobile agents in JADE. While SAgent was designed for comprehensive security protocols with different design and interaction criteria, we show how efficient integrity-only protections can be seamlessly integrated into SAgent. In situations where the more challenging problem of working with secret data on remote hosts is not needed, these integrity protection techniques provide significantly better performance than the comprehensive protections, as we demonstrate through a series of experiments.
منابع مشابه
1 Reasoning about Message Integrity 1 Rajashekar
We propose an approach for reasoning about message integrity protection in cryptographic protocols. The set of axioms presented herein relate design parameters and assumptions of message integrity protection mechanisms to generic message integrity threats. Comparison of threat properties derived using these axioms with the policy goals for integrity protection aids in assessing the strength (or...
متن کاملInsecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
Cloud storage has a long string of merits but at the same time, poses many challenges on data integrity and privacy. A cloud data auditing protocol, which enables a cloud server to prove the integrity of stored files to a verifier, is a powerful tool for secure cloud storage. Wang et al. proposed a privacy-preserving public auditing protocol, however, Worku et al. found the protocol is seriousl...
متن کاملReasoning about Message Integrity
We propose an approach for reasoning about message integrity protection in cryptographic protocols. The set of axioms presented herein relate design parameters and assumptions of message integrity protection mechanisms to generic message integrity threats. Comparison of threat properties derived using these axioms with the policy goals for integrity protection aids in assessing the strength (or...
متن کاملAn Approach to full User Data Integrity Protection in UMTS Access Networks
During development of the UMTS security standard, 3GPP had to take various constraining aspects, like bandwidth and limited hardware, into account, so there were compromises made in security. One such compromise is the absence of a full userdata integrity protection mechanism. In this paper an approach is made to a full user data integrity protection mechanism in the UMTS access network. The cu...
متن کاملError bound optimization using second order cone programming
In safety of life applications using satellite navigation, the Protection Level (PL) equation translates what is known about the pseudorange errors into a hard bound on the positioning error (the Protection Level). The current PL equations for Satellite Based Augmentation Systems are based on Gaussian statistics: all errors are characterized by a zero mean Gaussian distribution which is an uppe...
متن کامل