The Community for Technology Leaders
e-Technology, e-Commerce, and e-Services, IEEE International Conference on (2005)
Hong Kong, China
Mar. 29, 2005 to Apr. 1, 2005
ISBN: 0-7695-2274-2
pp: 282-285
Amitabh Saxena , La Trobe University, Australia
Ben Soh , La Trobe University, Australia
Mobile agents are mobile programs capable of maintaining their execution state as they migrate across different execution platforms. Large-scale deployment of mobile agent based applications has not been possible because some key technical and security issues remain unsolved.<div></div> In this paper we propose a method to protect mobile agent platforms from malicious agents using authentication primitives. In contrast to approaches for host protection based on sandbox environments, our method aims to validate the itinerary of an agent. We use the concept of one-way signatures to connect arbitrary hosts in a chain of trust, thus enabling ad-hoc trust relationships to be formed. Our technique does not require the use of any trusted third parties or tamper proof hardware solutions.
Amitabh Saxena, Ben Soh, "Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties", e-Technology, e-Commerce, and e-Services, IEEE International Conference on, vol. 00, no. , pp. 282-285, 2005, doi:10.1109/EEE.2005.35
94 ms
(Ver 3.3 (11022016))