Skip to main content

Secure Transactions with Mobile Agents in Hostile Environments

  • Conference paper
Information Security and Privacy (ACISP 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1841))

Included in the following conference series:

Abstract

A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, we consider a framework for the prevention of agent tampering without compromising the mobility or autonomy of the agent. Our approach uses encrypted functions. We present an RSA implementation which answers affirmatively the open problem on undetachable signatures of Sander and Tschudin.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chess, D., Harrison, C., Kershenbaum, A.: Mobile Agents: Are They a Good Idea? In: Vitek, J., Tschudin, C. (eds.) Mobile Object Systems. Springer, Heidelberg (1996)

    Google Scholar 

  2. Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant Agents for Mobile Computing, Technical Report, RC 20010, IBM T.J. Watson Research Center, NY (1995)

    Google Scholar 

  3. Chess, D.M.: Security Issues in Mobile Code Systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 1–14. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Don, C., Jacques, S., Serge, V.: Attacks on the Birational Permutation Signature Schemes. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 435–443. Springer, Heidelberg (1994)

    Google Scholar 

  5. William, F., Joshua, G., Vipin, S.: Security for Mobile Agents: Authentication and State Appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 118–130. Springer, Heidelberg (1996)

    Google Scholar 

  6. Fritz, H.: Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Hohl, F.: A Model of Attacks of Malicious Hosts Against Mobile Agents. In: Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, INRIA, France, pp. 105 - 120 (1998)

    Google Scholar 

  8. Markus, J., Ari, J.: X-cash: Executable Digital Cash. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 16–27. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Panayiotis, K., George, K., Vassilios, C.: Mobile Agents for Secure Electronic Transactions. In: Recent Advances in Signal Processing and Communications, pp. 363–368. World Scientific and Engineering Society Press, Singapore (1999)

    Google Scholar 

  10. Richard, L., Tomas, S.: An Additively Homomorphic Encryption Scheme or How to Introduce a Partial Trapdoor in the Discrete Log ( November 1997) (submitted for Publication)

    Google Scholar 

  11. Sergio, L., Refik, M.: Privacy for Mobile Code. In: proceedings of Distributed Object Security Workshop OOPSLA 1999, Denver (November 1999)

    Google Scholar 

  12. Merwe, J., Solms, S.H.: Electronic Commerce with Secure Intelligent Trade Agents. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 452–462. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  13. Palmer, E.: An Introduction to Citadel – a Secure Crypto Coprocessor for Workstations. In: Proceedings of the IFIP SEC 1994 Conference, Curacao (1994)

    Google Scholar 

  14. Ronald, R., Adi, S., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of ACM 21(2), 120–126 (1978)

    Article  Google Scholar 

  15. Tomas, S., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  16. Adi, S.: Efficient Signature Schemes Based On Birational Premutations. In: Proceedings of the DARPA Workshop on foundations for secure mobile code, Monterey CA, USA (1997)

    Google Scholar 

  17. Giovanni, V.: Cryptographic Traces for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 137–153. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  18. Wilhelm, U.G.: Cryptographically Protected Objects. Technical Report, Ecole Polytechnique Federale de Lausanne, Switzerland (1997)

    Google Scholar 

  19. Yee Bennet, S.: A Sanctuary for Mobile Agents. In: Proceedings of the DARPA workshop on foundations for secure mobile code, Monterey CA, USA (1997)

    Google Scholar 

  20. Xun, Y., Feng, W.X., Yan, L.K.: A Secure Intelligent Trade Agent System. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 218–228. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  21. Michael, Z., Helge, M., Kurt, G.: Security Requirements for Mobile Agents in Electronic Markets. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 205–217. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V. (2000). Secure Transactions with Mobile Agents in Hostile Environments. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_24

Download citation

  • DOI: https://doi.org/10.1007/10718964_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67742-0

  • Online ISBN: 978-3-540-45030-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics