Mobile Agents Integrity Research

نویسندگان

  • Huanmei Guan
  • Huanguo Zhang
  • Ping Chen
  • Yajie Zhou
چکیده

Mobile agents are an important technology in e-commerce systems and offer new possibilities for the e-commerce applications. This paper examines some mobile agent integrity protocols and proposes a new protecting protocol of mobile agent integrity. It can defend most known attacks, provides encryption transmission and route secrecy of mobile agents.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Mobile Agents Through Evaluation of Encrypted Functions∗

The mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However, it has not become popular due to some problems such as security. The fact that computers have complete control over all the programs makes it very hard to protect mobile agents from untrusted hosts. In this paper we propose a security approach for mobile agents,...

متن کامل

Integrity protection for Code-on-Demand mobile agents in e-commerce

The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection i...

متن کامل

Mobile Agent Data Integrity Using Multi-agent Architecture

Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of malicious activity a posteriori. We propose multi-agent architecture that uses cooperating multi-hop and single-hop agents to prevent such attacks and discuss security features of our scheme. We also examine data protec...

متن کامل

Secure Data Collection with Updates

This paper describes a protocol to protect data collected by mobile agents roaming through a set of potentially malicious hosts. This protocol is based on an original secure cryptographic technique that assures the integrity of a sequence of data segments regardless of the order of each segment in the sequence. The protocol allows each host to update the data it previously submitted in a way th...

متن کامل

Secure Migration of Mobile Agents based on Distributed Trust

Integrity of mobile agents in open environments in which no guarantees can be provided on the integrity of the hosts on which they run, is an open challenge. This paper presents a method with which tampering can be detected. This method is based on the notion of distributed trust; trust distributed over the hosts involved.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007