The Community for Technology Leaders
e-Technology, e-Commerce, and e-Services, IEEE International Conference on (2005)
Hong Kong, China
Mar. 29, 2005 to Apr. 1, 2005
ISBN: 0-7695-2274-2
pp: 282-285
Amitabh Saxena , La Trobe University, Australia
Ben Soh , La Trobe University, Australia
Mobile agents are mobile programs capable of maintaining their execution state as they migrate across different execution platforms. Large-scale deployment of mobile agent based applications has not been possible because some key technical and security issues remain unsolved.<div></div> In this paper we propose a method to protect mobile agent platforms from malicious agents using authentication primitives. In contrast to approaches for host protection based on sandbox environments, our method aims to validate the itinerary of an agent. We use the concept of one-way signatures to connect arbitrary hosts in a chain of trust, thus enabling ad-hoc trust relationships to be formed. Our technique does not require the use of any trusted third parties or tamper proof hardware solutions.

A. Saxena and B. Soh, "Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties," Proceedings. The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service(EEE), Hong Kong, 2005, pp. 282-285.
94 ms
(Ver 3.3 (11022016))