User menu

A mechanism to avoid collusion attacks based on code passing in mobile agent systems

Bibliographic reference Jaimez, M. ; Esparza, O. ; Munoz, J.L. ; Alins-Delgado, J.J. ; Mata-Di az, J.. A mechanism to avoid collusion attacks based on code passing in mobile agent systems.Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009 (Brussels, Belgium, 1-4 September 2009). In: Markowitch, O.; Bilas, A.; Hoepman, J.-H.; Mitchell, C.J.; Quisquater, J.-J.;, Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009, Springer verlag2009, p. 12-27
Permanent URL http://hdl.handle.net/2078.1/67497
  1. Benachenhou Lotfi, Pierre Samuel, Protection of a mobile agent with a reference clone, 10.1016/j.comcom.2005.01.006
  2. Borrell J., Robles S., Serra J., Riera A., Securing the itinerary of mobile agents through a non-repudiation protocol, 10.1109/ccst.1999.797954
  3. Westhoff Dirk, Schneider Markus, Unger Claus, Kaderali Firoz, Methods for Protecting a Mobile Agent’s Route, Lecture Notes in Computer Science (1999) ISBN:9783540666950 p.57-71, 10.1007/3-540-47790-x_7
  4. Esparza Oscar, Muñoz Jose L., Soriano Miguel, Forné Jordi, Punishing malicious hosts with the cryptographic traces approach, 10.1007/bf03037399
  5. Esparza Oscar, Muñoz Jose L., Soriano Miguel, Forné Jordi, Secure brokerage mechanisms for mobile electronic commerce, 10.1016/j.comcom.2006.03.005
  6. Esparza Oscar, Soriano Miguel, Muñoz Jose L., Forne J., Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts, Lecture Notes in Computer Science (2003) ISBN:9783540202981 p.286-295, 10.1007/978-3-540-39646-8_27
  7. Haridi Seif, Van Roy Peter, Brand Per, Schulte Christian, Programming languages for distributed applications, 10.1007/bf03037481
  8. Hohl Fritz, Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts, Lecture Notes in Computer Science (1998) ISBN:9783540647928 p.92-113, 10.1007/3-540-68671-1_6
  9. Hohl, F.: A Framework to Protect Malicious Hosts Attacks by Using Reference States. In: International Conference on Distributed Computing Systems, ICDCS (2000)
  10. Jansen W.A, Countermeasures for mobile agent security, 10.1016/s0140-3664(00)00253-x
  11. Jansen, W., Karygiannis, T.: Mobile Agent Security. Special publication 800-19, National Institute of Standards and Technology, NIST (1999)
  12. Kinny David, Reliable Agent Communication — A pragmatic perspective, 10.1007/bf03037251
  13. Leung Kwai-Ki, Ng Kam-Wing, Detection of Malicious Host Attacks by Tracing with Randomly Selected Hosts, Embedded and Ubiquitous Computing (2004) ISBN:9783540229063 p.839-848, 10.1007/978-3-540-30121-9_80
  14. Maña Antonio, Lopez Javier, Ortega Juan J., Pimentel Ernesto, Troya Jose M., A framework for secure execution of software, 10.1007/s10207-004-0048-6
  15. Mir Joan, Borrell Joan, Protecting Mobile Agent Itineraries, Lecture Notes in Computer Science (2003) ISBN:9783540202981 p.275-285, 10.1007/978-3-540-39646-8_26
  16. Oppliger R, Security issues related to mobile code and agent-based systems, 10.1016/s0140-3664(99)00083-3
  17. Ouardani Abdelhamid, Pierre Samuel, Boucheneb Hanifa, A security protocol for mobile agents based upon the cooperation of sedentary agents, 10.1016/j.jnca.2006.04.008
  18. Riordan James, Schneier Bruce, Environmental Key Generation Towards Clueless Agents, Lecture Notes in Computer Science (1998) ISBN:9783540647928 p.15-24, 10.1007/3-540-68671-1_2
  19. Roth Volker, Mutual Protection of Co-operating Agents, Secure Internet Programming (1999) ISBN:9783540661306 p.275-285, 10.1007/3-540-48749-2_13
  20. Sander Tomas, Tschudin Christian F., Protecting Mobile Agents Against Malicious Hosts, Lecture Notes in Computer Science (1998) ISBN:9783540647928 p.44-60, 10.1007/3-540-68671-1_4
  21. Vigna Giovanni, Cryptographic Traces for Mobile Agents, Lecture Notes in Computer Science (1998) ISBN:9783540647928 p.137-153, 10.1007/3-540-68671-1_8
  22. Wilhelm Uwe G., Staamann Sebastian, Buttyán Levente, Introducing Trusted Third Parties to the Mobile Agent Paradigm, Secure Internet Programming (1999) ISBN:9783540661306 p.469-489, 10.1007/3-540-48749-2_22
  23. Yee, B.S.: A sanctuary for mobile agents. In: DARPA workshop on foundations for secure mobile code (1997)
  24. Yu, C.M., Ng, K.W.: A flexible tamper-detection protocol for mobile agents on open networks. In: International Conference of Information and Knowledge Engineering (IKE 2002) (2002)