메뉴 건너뛰기




Volumn 30, Issue 3, 2007, Pages 1228-1243

A security protocol for mobile agents based upon the cooperation of sedentary agents

Author keywords

Cooperating agent; Malicious host; Mobile agent; Security protocol; Sedentary agent

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FAULT TOLERANT COMPUTER SYSTEMS; MOBILE AGENTS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 34047160916     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2006.04.008     Document Type: Article
Times cited : (23)

References (17)
  • 1
    • 85013566936 scopus 로고    scopus 로고
    • Allée G, Pierre S, Glitho RH, El Rhazi A. An improved itinerary recording protocol for securing distributed architectures based on mobile agents, Int J Mobile Inform Systems, 2005; 1(2): 127-49.
  • 2
    • 34047151615 scopus 로고    scopus 로고
    • Bäumer C, Breugst M, Choy S, Magedanz T. Grasshopper-a universal agent platform based on OMG MASIF and FIPA standards. First International Workshop on Mobile Agents for Telecommunication Applications (MATA'99), Ottawa, Canada. USA: World Scientific Publishing; October 1999. p. 1-8.
  • 3
    • 0141651851 scopus 로고    scopus 로고
    • El Rhazi A, Pierre S, Boucheneb H. Secure protocol in mobile agent environments. IEEE CCECE 2003, May 4-7, vol. 2, Montreal, pp.777-80.
  • 4
    • 34047178206 scopus 로고    scopus 로고
    • Farmer WM, Guttman JD, Swarup V. Security for mobile agents: issues and requirements. In: Proceedings of the 19th National Information Systems Security Conference, October 1996. p. 591-7.
  • 5
    • 34047157979 scopus 로고    scopus 로고
    • Hohl F. Time limited blackbox security: protection mobile agent from malicious hosts. Mobile agents and security, Lecture Notes in Computer Science, No. 1419. Berlin: Springer; 1998. p. 92-113.
  • 6
    • 0033706501 scopus 로고    scopus 로고
    • Hohl F. A framework to protect mobile agents by using reference states. In: Los Alamitos, editor. Proceedings of the 20th international conference on distributed computing systems, California: IEEE Computer Society; 2000. p. 410-7.
  • 7
    • 34047129494 scopus 로고    scopus 로고
    • IKV++, Grasshopper Basics And Concepts, Berlin Germany 1998. online documentation: http://www.grasshopper.de/download/doc/GrasshopperAndStandards.pdf
  • 8
    • 34047152612 scopus 로고    scopus 로고
    • Institute for Applied Information, The IAIK Java Cryptography Extension (IAIK-JCE) 3.03. In: Processing and Communication of the Technical University Graz, 2002. online documentation:http://jce.iaik.tugraz.at/products/01_jce/documentation/ja vadoc/
  • 9
    • 34047157428 scopus 로고    scopus 로고
    • Jansen WA, Karygiannis T. Mobile agent security. In: NIST Special Publication 800-19, National Institute of Standards and Technology, August 1999.
  • 10
    • 0034315517 scopus 로고    scopus 로고
    • Jansen WA. Countermeasures for mobile agent security. Computer communications, special issue on advanced security techniques for network protection. Amsterdam: Elsevier; November 2000.
  • 11
    • 0033702826 scopus 로고    scopus 로고
    • Karnik NM, Tripathi AR. A security architecture for mobile agents in Ajanta. In: Los Alamitos, editor. Proceedings of the 20th international conference on distributed computing systems. California: IEEE Computer Society; 2000. p. 402-9.
  • 12
    • 85015667755 scopus 로고    scopus 로고
    • Minsky Y, Van Renesse R, Scheinder F, Stoller S. Cryptographic support for fault-tolerant distributed computing. In: Proceeding of the 17th ACM SIGOPS, European Workshop, 1996. p. 109-14.
  • 13
    • 34047162736 scopus 로고    scopus 로고
    • Poslad SJ, Bourne RA, Hayzelden ALG, Buckle P. Agent technology for communication infrastructure: an introduction. In: Wiley, editor. Agent technology for communication Infrastructure, 2001. p. 5-15.
  • 14
    • 34047140206 scopus 로고    scopus 로고
    • Roth V. Mutual Protection of co-operating agents. In: Vitek, Jensen, editors. Secure internet programming. Berlin: Verlag; 1998. p. 26-37.
  • 15
    • 34047154853 scopus 로고    scopus 로고
    • Sander T, Tschudin CF. Protecting mobile agents against malicious hosts. In: Vigna G, editor. Mobile agents and security, Lectur Notes in Computer Science, No. 1419. Berlin: Springer; 1998. p. 44-60.
  • 16
    • 34047152087 scopus 로고    scopus 로고
    • Schnoebelen P, Laroussinie F, Bidoit M, Bérard B, Petit A. Systems and software verification: model-checking techniques and tools. Berlin: Springer, 2001. p. XIII-V.
  • 17
    • 34047172350 scopus 로고    scopus 로고
    • Vigna G. Cryptographic traces for mobile agents. In: Vigna G, editor. Mobile agents and security, Lectur Notes in Computer Science, No. 1419. Berlin: Springer; 1998. p. 137-53.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.