Advertisement

Trusted Computing: The Cornerstone in the Secure Migration Library for Agents

  • Antonio Muñoz
  • Antonio Maña
  • Daniel Serrano
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 55)

Abstract

The agent paradigm can play an important role and can suit the needs of many applications in new emerging Ambient Intelligence scenarios. Unfortunately the lack of security is hindering the application of this technology in real world applications. The problem known as malicious hosts is considered the most difficult to solve in mobile agent. Therefore, we address this problem by means of a secure migration process using for that the Trusted Computing technology. In this paper we aim to study the benefits in the introduction of trusted computing technology can bring to the mobile agent technology.

Keywords

Mobile Agent Security Protocol Trust Computing Destination Agency Source Agency 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Maña, A., Muñoz, A., Serrano, D.: Towards secure agent computing for ubiquitous computing and ambient intelligence. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 1201–1212. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  2. 2.
    D’Anna, L., Matt, B., Reisse, A., Van Vleck, T., Schwab, S., LeBlanc, P.: Self-protecting mobile agents obfuscation report. Technical Report 03-015, Network Associates Laboratories (2003)Google Scholar
  3. 3.
    Pearson, S.: How trusted computers can enhance for privacy preserving mobile applications. In: Proceedings of the 1st International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing, Taormina, Italy, pp. 609–613. IEEE Computer Society, Washington (2005)Google Scholar
  4. 4.
    Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 15–24. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  5. 5.
    JADE project official home page, http://jade.tilab.com
  6. 6.
    Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. PhD Thesis. Universite Catholique de Louvain (2003), http://www.dice.ucl.ac.be/~hachez/thesis_gael_hachez.pdf
  7. 7.
    Gosling, J., Joy, B., Steele, G.: The Java Language Specification. Addison-Wesley, Reading (1996)zbMATHGoogle Scholar
  8. 8.
    Necula, G.: Proof-Carrying Code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)Google Scholar
  9. 9.
    Gunter Carl, A., Peter, H., Scott, N.: Infrastructure for Proof-Referencing Code. In: Proceedings of Workshop on Foundations of Secure Mobile Code (March 1997)Google Scholar
  10. 10.
    Yee, B.S.: A Sanctuary for Mobile Agents. Secure Internet Programming (1999)Google Scholar
  11. 11.
    Trusted Computing Group: TCG Specifications (2005), https://www.trustedcomputinggroup.org/specs/
  12. 12.
    Wooldrigde, M.: Agent-based Software Engineering. In: IEE Proceedings on Software Engineering, vol. 144(1), pp. 26–37 (February 1997)Google Scholar
  13. 13.
    Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (1999), http://www.dice.ucl.ac.be/crypto/publications/1999/codemark.pdf CrossRefGoogle Scholar
  14. 14.
    Collberg, C., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. University of Auckland Technical Report 170 (2000)Google Scholar
  15. 15.
    Hussain, M., Seret, D.: A Comparative study of Security Protocols Validation Tools: HERMES vs. AVISPA. In: Proceecings of International Conference on Advanced Communication Technology (ICACT) 2006, IEEE Communication Society, Los Alamitos (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Antonio Muñoz
    • 1
  • Antonio Maña
    • 1
  • Daniel Serrano
    • 1
  1. 1.University of Malaga 

Personalised recommendations