Secure Transactions with Mobile Agents in Hostile Environments

نویسندگان

  • Panayiotis Kotzanikolaou
  • Mike Burmester
  • Vassilios Chrissikopoulos
چکیده

A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, we consider a framework for the prevention of agent tampering without compromising the mobility or autonomy of the agent. Our approach uses encrypted functions. We present an RSA implementation which answers affirmatively the open problem on undetachable signatures of Sander and Tschudin.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Electronic Commerce with Mobile Agents

transactions using mobile agents need secure protocols to help the mobile agents to accomplish the transactions initiated by a client in an electronic commerce. However, the mobile agent could encounter hostile environment. For example, a server may compromise the mobile agent and try to obtain private information of the client. A solution to tackle this issue has been proposed. However, the ex...

متن کامل

A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols

Mobile agents raise security issues such as the protection of platform/host that runs the mobile agent against attacks which can harm or use its resources without permission, and another is the need for protection to guard mobile agents and their supporting systems against the malicious attacks from a variety of intervening sources that might alter information it carries and processes when it v...

متن کامل

Information Flow Security in Dynamic Contexts

We study information flow security in the setting of mobile agents. We propose a sufficient condition to security named Persistent BNDC. A process is Persistent BNDC when every of its reachable states satisfies a basic Non-Interference property called BNDC. By imposing that security persists during process execution, one is guaranteed that every potential migration is performed in a stable, sec...

متن کامل

A Secure Real-Time Concurrency Control Protocol for Mobile Distributed Real-Time Databases

A class of security-critical applications with the requirements of timing constraints, such as wireless stock trading, power network scheduling, real-time traffic information management, etc., demand the support of mobile distributed real-time database systems. For the class of applications, mobile distributed realtime database systems must simultaneously satisfy two requirements in guaranteein...

متن کامل

Design Limitations Characteristicsand Analysis of Secure Mobile Transaction and Protocols

Today, new technologies that allow cellular (mobile) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. What must be done to secure financial transactions via mobile commerce? Due to the advent of the Internet, electronic business transactions have exploded around the globe. Gener...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000