Sciweavers

MAS
1998
Springer

Protecting Mobile Agents Against Malicious Hosts

14 years 4 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under execution and (b) the mobile code against tampering attempts by the executing host. Many techniques for the first problem (a) have been developed. The second problem (b) seems to be much harder: It is the general belief that computation privacy for mobile code cannot be provided without tamper resistant hardware. Furthermore it is doubted that an agent can keep a secret (e.g., a secret key to generate digital signatures). There is an error in reasoning in the arguments supporting these beliefs which we are going to point out. In this paper we describe software-only approaches for providing computation privacy for mobile code in the important case that the mobile code fragment computes an algebraic circuit (a polynomial). We further describe an approach how a mobile agent can digitally sign his output securel...
Tomas Sander, Christian F. Tschudin
Added 06 Aug 2010
Updated 06 Aug 2010
Type Conference
Year 1998
Where MAS
Authors Tomas Sander, Christian F. Tschudin
Comments (0)