메뉴 건너뛰기




Volumn 7, Issue 1, 2008, Pages 24-31

A robust framework for protecting computation results of mobile agents

Author keywords

Data integrity; Digital signature; Forward integrity; Mobile agent security; Non repudiation; Truncation resilience; Watermarking

Indexed keywords

ALGORITHMS; COMPUTATION THEORY; DIGITAL WATERMARKING; ELECTRONIC COMMERCE; SECURITY OF DATA; VERIFICATION;

EID: 41549112489     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2008.24.31     Document Type: Article
Times cited : (10)

References (17)
  • 1
    • 0033332886 scopus 로고    scopus 로고
    • Corradi, A., R. Montanari and C. Stefanelli, 1999. Mobile agents protection in the Internet environment. In: COMPSAC, pp: 80-85.
    • Corradi, A., R. Montanari and C. Stefanelli, 1999. Mobile agents protection in the Internet environment. In: COMPSAC, pp: 80-85.
  • 2
    • 33745006829 scopus 로고    scopus 로고
    • Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts
    • Database and Expert System Applications DEXA, of, Springer-Verlag
    • Esparza, O., M. Fernandez, M. Soriano, J.L. Munoz and J. Forne, 2003. Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. In: Database and Expert System Applications (DEXA), Vol. 2736 of LNCS. Springer-Verlag.
    • (2003) LNCS , vol.2736
    • Esparza, O.1    Fernandez, M.2    Soriano, M.3    Munoz, J.L.4    Forne, J.5
  • 5
    • 84867313902 scopus 로고    scopus 로고
    • Protecting the computation results of free-roaming agents
    • 2nd International Workshop on Mobile Agents, of, Springer-Verlag, pp
    • Karjoth, G., N. Asokan and C. Gulcu, 1998. Protecting the computation results of free-roaming agents. In: 2nd International Workshop on Mobile Agents, Vol. 1477 of Lecture Notes in Computer Science, Springer-Verlag, pp: 195-207.
    • (1998) Lecture Notes in Computer Science , vol.1477 , pp. 195-207
    • Karjoth, G.1    Asokan, N.2    Gulcu, C.3
  • 6
    • 0042849357 scopus 로고    scopus 로고
    • Security in the Ajanta mobile agent system
    • Technical Report TR-5-99, University of Minnesota, Minneapolis, MN 55455, USA
    • Karnik, N.M. and A.R. Tripathi, 1999. Security in the Ajanta mobile agent system. Technical Report TR-5-99, University of Minnesota, Minneapolis, MN 55455, USA.
    • (1999)
    • Karnik, N.M.1    Tripathi, A.R.2
  • 9
    • 0344087860 scopus 로고    scopus 로고
    • Ph.D Thesis, ENST Paris/Institut Eurecom
    • Loureiro, S., 2001. Mobile Code Protection. Ph.D Thesis, ENST Paris/Institut Eurecom.
    • (2001) Mobile Code Protection
    • Loureiro, S.1
  • 11
    • 84946833891 scopus 로고    scopus 로고
    • How to Leak a Secret
    • Advances in Cryptology-ASIACRYPT, Springer-Verlag, pp
    • Rivest, R.L., S. Adi and T. Yael, 2001. How to Leak a Secret. Advances in Cryptology-ASIACRYPT, Lecture Notes in Computer Science, Vol. 2248. Springer-Verlag, pp: 552-565.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Adi, S.2    Yael, T.3
  • 12
    • 84982937984 scopus 로고    scopus 로고
    • Mutual Protection of Co-Operating Agents
    • Secure Internet Programming: Security Issues for Mobile and Distributed Objects, New York, USA: Springer-Verlag, pp
    • Roth, V., 1999. Mutual Protection of Co-Operating Agents. Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS 1603, New York, USA: Springer-Verlag, pp: 275-285.
    • (1999) LNCS 1603 , pp. 275-285
    • Roth, V.1
  • 13
    • 84948143184 scopus 로고    scopus 로고
    • On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
    • Proceeding of Mobile Agents, of
    • Roth, V., 2001. On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. In: Proceeding of Mobile Agents, Vol. 2240 of Lecture Notes in Computer Science. Springer Verlag.
    • (2001) Lecture Notes in Computer Science. Springer Verlag , vol.2240
    • Roth, V.1
  • 15
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic Traces for Mobile Agents
    • Springer, pp
    • Vigna, J., 1998. Cryptographic Traces for Mobile Agents. Mobile Agent and Security, LNCS 1419, Springer, pp: 137-153.
    • (1998) LNCS. Mobile Agent and Security , vol.1419 , pp. 137-153
    • Vigna, J.1
  • 16
    • 84885893076 scopus 로고
    • Data Lockers: Mobile-Agent Based Middleware for the Security and Availability of Roaming Users Data
    • 7th International Conference on Cooperative Information Systems CoopIS, Eilat, Israel, September 6-8, Springer, pp
    • Villate, Y., A. Illarramendi and E. Pitoura, 2000. Data Lockers: Mobile-Agent Based Middleware for the Security and Availability of Roaming Users Data. In: 7th International Conference on Cooperative Information Systems (CoopIS), Eilat, Israel, September 6-8, LNCS 1901, Springer, pp: 275-286.
    • (1901) LNCS , pp. 275-286
    • Villate, Y.1    Illarramendi, A.2    Pitoura, E.3
  • 17
    • 84982946701 scopus 로고    scopus 로고
    • A Sanctuary for Mobile Agents
    • Secure Internet Programming, Vitek, J. and C. Jensen Eds, of, Springer-Verlag, pp
    • Yee, B., 1999. A Sanctuary for Mobile Agents. In: Secure Internet Programming, Vitek, J. and C. Jensen (Eds.). Vol. 1603 of Lecture Notes in Computer Science, Springer-Verlag, pp: 261-273.
    • (1999) Lecture Notes in Computer Science , vol.1603 , pp. 261-273
    • Yee, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.