Protecting agents from malicious hosts using TPM.

作者: Antonio Muñoz , Daniel Serrano , Antonio Maña

DOI:

关键词:

摘要: Software agents represent a promising computing paradigm. They are an elegant technology to solve problems that can not be easily solved in other way. The Scientific Community has proved the use of software approach simplifies solution difierent type traditional problems. A proof this is several important applications exist based on technology. It clear have so many benefits, but unfortunately, lack appropriate security mechanisms for systems them represents barrier widespread paradigm industry. application current trivial agent system developers, since they usually experts and consequently do count expertise. This paper presents new protection infrastructure solving problem known as malicious host mobile systems. implements secure protocol migrate from relying hardware elements, particularly it recent advances Trusted Platforms Modules (TPM) computing. In order provide easy way using proposed we by means extension Java Agent Development framework (JADE). Finally, migrating presented been validated Automated Validation Internet Security Protocols Applications (AVISPA) framework, validation paper.

参考文章(25)
Reiner Dojen, Tomas Flanagan, Tom Coffey, On Different Approaches to Establish the Security of Cryptographic Protocols. Security and Management. pp. 637- 643 ,(2003)
U. M. Schwuttke, A. G. Quan, Enhancing performance of cooperating agents in real-time diagnostic systems international joint conference on artificial intelligence. pp. 332- 337 ,(1993)
Robert S. Gray, Agent Tcl: a flexible and secure mobile-agent system TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4. pp. 2- 2 ,(1998)
Bennet S. Yee, A sanctuary for mobile agents Secure Internet programming. pp. 261- 273 ,(2001) , 10.1007/3-540-48749-2_12
Tomas Sander, Christian F. Tschudin, Protecting Mobile Agents Against Malicious Hosts Mobile Agents and Security. pp. 44- 60 ,(1998) , 10.1007/3-540-68671-1_4
William M. Farmer, Joshua D. Guttman, Vipin Swarup, Security for Mobile Agents: Authentication and State Appraisal european symposium on research in computer security. pp. 118- 130 ,(1996) , 10.1007/3-540-61770-1_31
Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater, Robust Object Watermarking: Application to Code Information Hiding. ,vol. 1768, pp. 368- 378 ,(2000) , 10.1007/10719724_25
Stuart Haber, W. Scott Stornetta, How to time-stamp a digital document Journal of Cryptology. ,vol. 3, pp. 99- 111 ,(1991) , 10.1007/BF00196791
Haralambos Mouratidis, Manuel Kolp, Stephane Faulkner, Paolo Giorgini, None, A secure architectural description language for agent systems adaptive agents and multi-agents systems. pp. 578- 585 ,(2005) , 10.1145/1082473.1082561