메뉴 건너뛰기




Volumn 6, Issue 5, 2009, Pages 30-58

Protecting agents from malicious hosts using TPM

Author keywords

Agent Protection; Hardware Protection; TPM

Indexed keywords


EID: 77953525702     PISSN: 09729038     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (49)
  • 1
    • 34247249366 scopus 로고    scopus 로고
    • Belief revision for AgentS-peak agents
    • the Proc Of Autonomous Agents and Multi Agents Systems
    • Alechina, N., Alechina, R., Habner, J., Jago, M., Logan, B., "Belief revision for AgentS-peak agents". the Proc Of Autonomous Agents and Multi Agents Systems 2006. Hakodate, Japan. ISBN:1-59593-303-4, p1288 - 1290.
    • (2006) Hakodate, Japan. ISBN:1-59593-303-4 , pp. 1288-1290
    • Alechina, N.1    Alechina, R.2    Habner, J.3    Jago, M.4    Logan, B.5
  • 2
    • 84874724444 scopus 로고    scopus 로고
    • Online available at, the AVISPA project homepage
    • "AVISPA Project". Online available at http://www.avispa-project.org. the AVISPA project homepage.
    • "AVISPA., Project".
  • 6
    • 77953486754 scopus 로고    scopus 로고
    • Aglets: Enabling the Virtual Enterprise"
    • the Proc. Of Managing Enterprises Stakeholders, Engineering, Logistics and Achievement ME-SELA'97,ISBN 1, 86058 066
    • Clements, P., Papaioannou, T., Edwards, J., "Aglets: Enabling the Virtual Enterprise". the Proc. Of Managing Enterprises Stakeholders, Engineering, Logistics and Achievement (ME-SELA'97) ISBN 1 86058 066 1, p425.
    • , vol.1 , pp. 425
    • Clements, P.1    Papaioannou, T.2    Edwards, J.3
  • 7
    • 1642319729 scopus 로고    scopus 로고
    • Proceedings of SAM'03 (Conference on Security and Management), Col. II, Las Vegas, USA, 23-26 June, ISBN1-932415-18-1. Ed. H. R. Arabnia and Y. Mun
    • Coffey, T., Dojen, R. and Flanagan, T., "On Di_erent Approaches to Establish the Se-curity of Cryptographic Protocols", Proceedings of SAM'03 (Conference on Security and Management), Col. II, Las Vegas, USA, 23-26 June 2003, Pages 637-643, ISBN1-932415-18-1. Ed. H.R.Arabnia and Y. Mun.
    • (2003) On Di_erent Approaches to Establish the Se-curity of Cryptographic Protocols , pp. 637-643
    • Coffey, T.1    Dojen, R.2    Flanagan, T.3
  • 12
    • 0039158307 scopus 로고    scopus 로고
    • General Magic Inc, online available at
    • General Magic, Inc. "The Telescript Language Reference", online available at http://www.genmagic.com-Telescript.
    • The Telescript Language Reference
  • 15
    • 77953494915 scopus 로고    scopus 로고
    • Infrastructure for Proof-Referencing Code
    • Proceedings, Workshop on Foundations of Secure Mobile Code, March
    • Gunter C. A., Homeier P., Nettles S. "Infrastructure for Proof-Referencing Code". Proceedings, Workshop on Foundations of Secure Mobile Code, March 1997.
    • (1997)
    • Gunter, C.A.1    Homeier, P.2    Nettles, S.3
  • 17
    • 0025849585 scopus 로고
    • How to Time-Stamp a Digital Document"
    • Haber, S., and Stornetta, S. "How to Time-Stamp a Digital Document", Journal of Cryptology, vol. 3, pp. 99-111, 1991.
    • (1991) Journal of Cryptology , vol.3 , pp. 99-111
    • Haber, S.1    Stornetta, S.2
  • 19
    • 33750948386 scopus 로고    scopus 로고
    • Published in Proceecings of International Conference on Advanced Communication Technology (ICACT), IEEE Communication Society. "JADE". Online available at
    • Hussain, M., Seret, D., "A Comparative study of Security Protocols Validation Tools: HER-MES vs. AVISPA". Published in Proceecings of International Conference on Advanced Communication Technology (ICACT) 2006. IEEE Communication Society. "JADE". Online available at http://jade.tilab.com/.
    • (2006) "A Comparative study of Security Protocols Validation Tools: HER-MES vs. AVISPA".
    • Hussain, M.1    Seret, D.2
  • 21
    • 77953521373 scopus 로고    scopus 로고
    • Online available at
    • "JAVACT project". Online available at http://www.irit.fr/recherches/ISPR/IAM/JavAct.html.
    • JAVACT project
  • 22
    • 77953521654 scopus 로고    scopus 로고
    • AIK Java Crytology
    • "AIK Java Crytology", 2001, http://jcewww.iaik.at/. "Java Secure Socket Extension (JSSE) Reference Guide", http:// java.sun.com/ j2se/1.4.2/ docs/ guide/ security/jsse/JSSERefGuide.html.
  • 24
    • 0019634370 scopus 로고    scopus 로고
    • Pasword authentication with insecure communication
    • Communications ACM, NY, USA. ACM Press, vol.24
    • Maña, A. "Software Protection based on smartcards". PhD Thesis. University of Mlaga. 2003.
    • (1981) , pp. 770-720
    • Lamport, L.1
  • 26
    • 77953504293 scopus 로고    scopus 로고
    • A Hardware based Infrastructure for Agent Protection
    • th October, 2008, Advances in Soft Computing, Springer Verlag, Vol. 51, Corchado, Juan, M., Tapia, Dante, Bravo, Jose, (Eds., ), illus., SoftcoverISBN: 978-3-540-85866-9
    • th October, 2008. Advances in Soft Computing, Springer Verlag , Vol. 51 Corchado, Juan M.; Tapia, Dante; Bravo, Jose (Eds.). 2009, XII, 354 p. 131 illus., SoftcoverISBN: 978-3-540-85866-9.
    • (2009) , vol.12 , Issue.354 , pp. 131
    • Maña, A.1    Muñoz, A.2
  • 27
    • 77953517177 scopus 로고    scopus 로고
    • Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence
    • th UIC. Published bySpringer-Verlag. LNCS, ISSN
    • th UIC. Published bySpringer-Verlag. LNCS, ISSN, 0302-9743.
    • Maña, A.1    Muñoz, A.2    Serrano, D.3
  • 28
    • 70349665527 scopus 로고    scopus 로고
    • SecMiLiA: An Approach in the Agent Protection
    • the proceedings of the International Conference on Availability, Reliability and Security, ARES, published by IEEE Computer Society Press
    • Muñoz, A., Maña, A., Serrano, D. "SecMiLiA: An Approach in the Agent Protection". the proceedings of the International Conference on Availability, Reliability and Security, ARES 2009, published by IEEE Computer Society Press.
    • (2009)
    • Muñoz, A.1    Maña, A.2    Serrano, D.3
  • 30
    • 0030685617 scopus 로고    scopus 로고
    • Proof-Carrying Code
    • th Annual Symposium on Principles of Programming Languages
    • th Annual Symposium on Principles of Programming Languages. 1997.
    • (1997)
    • Necula, G.1
  • 31
    • 0029717330 scopus 로고    scopus 로고
    • Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, Oregon, May
    • Ordille, J. "When agents Roam, Who can You Trust?". Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, Oregon, May 1996.
    • (1996) When agents Roam, Who can You Trust?
    • Ordille, J.1
  • 32
    • 0032028340 scopus 로고    scopus 로고
    • IEEE Computer, March
    • st Century". IEEE Computer, March, 1998, pp 23-30.
    • (1998) st Century , pp. 23-30
    • Ousterhout, J.1
  • 36
    • 77953498068 scopus 로고
    • Protecting Mobile Agents Against Malicious Hosts
    • G. Vigna (Ed.), LNCS, No.S225 711, August
    • Sander, T., and Tschudin, C. "Protecting Mobile Agents Against Malicious Hosts", G. Vigna (Ed.), Mobile Agents and Security. Springer-Verlag, LNCS No. S225 711, August 1983.
    • (1983) Mobile Agents and Security. Springer-Verlag , vol.711
    • Sander, T.1    Tschudin, C.2
  • 38
    • 77953503701 scopus 로고
    • Enhancing Performance of Cooperating Agents in Real-Time Diagnostic Systems
    • Proceedings of the Thirteenth International Joint Conference on Arti_cial Intelligence (IJCAI-93), 332337
    • Schwuttke, U. M., and Quan, A. G. 1993. "Enhancing Performance of Cooperating Agents in Real-Time Diagnostic Systems". Proceedings of the Thirteenth International Joint Conference on Arti_cial Intelligence (IJCAI-93), 332337. Menlo Park, Calif.: International Joint Conferences on Arti_cial Intelligence.
    • (1993) Menlo Park, Calif.: International Joint Conferences on Arti_cial Intelligence
    • Schwuttke, U.M.1    Quan, A.G.2
  • 39
    • 70449678535 scopus 로고    scopus 로고
    • The JACK Usage Report
    • the Proc Of. Autonomous Agents and Multi Agents Systems, (AAMAS 03)
    • Shepherdson, D., "The JACK Usage Report". the Proc Of. Autonomous Agents and Multi Agents Systems, (AAMAS 03) 2003 .
    • (2003)
    • Shepherdson, D.1
  • 40
    • 0025505149 scopus 로고
    • ACM Transactions on Programming Languages and Systems (TOPLAS) archive, ISSN:0164-0925
    • Stamos, J., and Gi_ord, D. "Remote Evaluation". ACM Transactions on Programming Languages and Systems (TOPLAS) archive, ISSN:0164-0925. Vol, Issue 4. 1990. pp 537 - 564.
    • (1990) Remote Evaluation , vol.4 , Issue.4 , pp. 537-564
    • Stamos, J.1    Gifford, D.2
  • 41
    • 84947921326 scopus 로고    scopus 로고
    • Robust Object Watermarking: Ap-plication to Code"
    • Proceedings of Info Hiding '99, Springer-Verlag. LNCS 1768
    • Stern, J. P., Hachez, G., Koeune, F., Quisquater, J. J. "Robust Object Watermarking: Ap-plication to Code". Proceedings of Info Hiding '99, Springer-Verlag. LNCS 1768, pp. 368-378, 1999. http://www.dice.ucl.ac.be/crypto/publications/1999/codemark.pdf.
    • (1999) , pp. 368-378
    • Stern, J.P.1    Hachez, G.2    Koeune, F.3    Quisquater, J.J.4
  • 42
  • 46
    • 0027836576 scopus 로고
    • Proceedings of the Fourteenth ACM Symposium on Operating Systmes Principles. ACM SIGOPS Operating Systems Review, Dec
    • Wahbe, R., Lucco, S., Anderson, T. "Efficent Software-Based Isolation". Proceedings of the Fourteenth ACM Symposium on Operating Systmes Principles. ACM SIGOPS Operating Systems Review, pp 203-216. Dec 1993.
    • (1993) Efficent Software-Based Isolation , pp. 203-216
    • Wahbe, R.1    Lucco, S.2    Anderson, T.3
  • 48
    • 0031074051 scopus 로고    scopus 로고
    • Agent-based Software Engineering
    • February
    • Wooldrigde, M. "Agent-based Software Engineering". IEE Proceedings on Software Engineering, 144(1), pages 26-37, February 1997.
    • (1997) IEE Proceedings on Software Engineering , vol.144 , Issue.1 , pp. 26-37
    • Wooldrigde, M.1
  • 49
    • 0004077062 scopus 로고    scopus 로고
    • Technical Report CS97-537, University of California in San Diego, April, Online available at
    • Yee, B. "A Sanctuary for Mobile Agents", Technical Report CS97-537, University of California in San Diego, April 28, 1997. Online available at http://www-cse.ucsd.edu/users/bsy/index.html.
    • (1997) A Sanctuary for Mobile Agents , vol.28
    • Yee, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.