Protecting a Mobile Agent's Route against Collusions

نویسندگان

  • Dirk Westhoff
  • Markus Schneider
  • Claus Unger
  • Firoz Kaderali
چکیده

In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses a method for concealing an agent's route information from being misused by sites en route to collect proole information of the agent's owner. Furthermore , it is shown that the protected route resists attacks from a single malicious host and from colluding malicious hosts as well.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote Electronic Gambling

We examine the problem of putting a casino on the Internet. We discuss fairly generating random bits and permutations for use in casino games, protecting against player/player and player/dealer collusions, and ensuring a secure audit trail that both the player and dealer can use to ensure payment of debts. We conclude with a series of open problems.

متن کامل

Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel

For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mobile agents that are dispatched in parallel. These schemes can protect the route information against malicious hosts and facilitate the dispatching of a large number of agents in parallel efficiently. Under noncollusio...

متن کامل

Protecting the Itinerary of Mobile Agents

Systems that support mobile agents are increasingly being used on the global Internet. An important application that is considered for these agents is electronic commerce, where agents roam the World Wide Web in search of goods for their owners. In these applications, an agent moves along some itinerary in order to search for the best ooer for the good sought by the user. The problem with this ...

متن کامل

Short 3-Secure Fingerprinting Codes for Copyright Protection

A construction is presented to obtain 3-secure fingerprinting codes for copyright protection. Resistance against collusions of up to three buyers is achieved with a codeword length dramatically shorter than the one required by the general Boneh-Shaw construction. Thus the proposed fingerprints require much less embedding capacity. Due to their very clandestine nature, collusions tend to involve...

متن کامل

Security and Robustness Enhanced Route Structures for Mobile Agents

In this paper, we present a parallel dispatch model with secure route structures for protecting the dispatch route information of mobile agents. This model facilitates efficient dispatching of agents in a hierarchical manner, and ensures route security by exposing minimal route information to hosts. It also provides the capability for detecting attacks. Based on the secure dispatch model, two e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999