Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts

作者: Fritz Hohl

DOI: 10.1007/3-540-68671-1_6

关键词: Interval (graph theory)Node (networking)Mobile agent securityAutonomous agentHost (network)Computer securityMobile agentStructure (mathematical logic)EngineeringExpiration date

摘要: In this paper, an approach to partially solve one of the most difficult aspects security mobile agents systems is presented, problem malicious hosts. This consists in possibility attacks against a agent by party that maintains system node, host. The idea create blackbox out original agent. A performs same work as agent, but different structure. difference allows assume certain protection time interval, during which it impossible for attacker discover relevant data or manipulate execution After interval and some associated get invalid cannot migrate interact anymore, prevents exploitation after interval.

参考文章(5)
Tomas Sander, Christian F. Tschudin, Protecting Mobile Agents Against Malicious Hosts Mobile Agents and Security. pp. 44- 60 ,(1998) , 10.1007/3-540-68671-1_4
William M. Farmer, Joshua D. Guttman, Vipin Swarup, Security for Mobile Agents: Authentication and State Appraisal european symposium on research in computer security. pp. 118- 130 ,(1996) , 10.1007/3-540-61770-1_31
Tomas Sander, Christian F. Tschudin, On Software Protection via Function Hiding information hiding. pp. 111- 123 ,(1998) , 10.1007/3-540-49380-8_9
T. Sander, C.F. Tschudin, Towards mobile cryptography ieee symposium on security and privacy. pp. 215- 224 ,(1998) , 10.1109/SECPRI.1998.674837
Lars Rasmusson, Sverker Jansson, Simulated social control for secure Internet commerce new security paradigms workshop. pp. 18- 25 ,(1996) , 10.1145/304851.304857