Protecting a Mobile Agent's Route against Collusions
نویسندگان
چکیده
In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses a method for concealing an agent's route information from being misused by sites en route to collect proole information of the agent's owner. Furthermore , it is shown that the protected route resists attacks from a single malicious host and from colluding malicious hosts as well.
منابع مشابه
Remote Electronic Gambling
We examine the problem of putting a casino on the Internet. We discuss fairly generating random bits and permutations for use in casino games, protecting against player/player and player/dealer collusions, and ensuring a secure audit trail that both the player and dealer can use to ensure payment of debts. We conclude with a series of open problems.
متن کاملSeveral Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mobile agents that are dispatched in parallel. These schemes can protect the route information against malicious hosts and facilitate the dispatching of a large number of agents in parallel efficiently. Under noncollusio...
متن کاملProtecting the Itinerary of Mobile Agents
Systems that support mobile agents are increasingly being used on the global Internet. An important application that is considered for these agents is electronic commerce, where agents roam the World Wide Web in search of goods for their owners. In these applications, an agent moves along some itinerary in order to search for the best ooer for the good sought by the user. The problem with this ...
متن کاملShort 3-Secure Fingerprinting Codes for Copyright Protection
A construction is presented to obtain 3-secure fingerprinting codes for copyright protection. Resistance against collusions of up to three buyers is achieved with a codeword length dramatically shorter than the one required by the general Boneh-Shaw construction. Thus the proposed fingerprints require much less embedding capacity. Due to their very clandestine nature, collusions tend to involve...
متن کاملSecurity and Robustness Enhanced Route Structures for Mobile Agents
In this paper, we present a parallel dispatch model with secure route structures for protecting the dispatch route information of mobile agents. This model facilitates efficient dispatching of agents in a hierarchical manner, and ensures route security by exposing minimal route information to hosts. It also provides the capability for detecting attacks. Based on the secure dispatch model, two e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999