DocumentCode
3229967
Title
Securing the itinerary of mobile agents through a non-repudiation protocol
Author
Borrell, Joan ; Robles, Sergi ; Serra, Joan ; Riera, Andreu
Author_Institution
Dept. d´´Inf., Univ. Autonoma de Barcelona, Spain
fYear
1999
fDate
1999
Firstpage
461
Lastpage
464
Abstract
We propose a cryptographic solution to protect the itinerary of mobile agents. We consider real-life applications, where hosts do not act independently but are included in a hierarchical structure. In this structure, at least one trusted authority exists: the certification authority that provides hosts with the necessary cryptographic keys to establish secret and authentic communications between them. In our solution, all agents necessary to the application are launched by a trusted authority (TA). Each agent carries its itinerary as a sequence of encrypted entries. Each entry is readable only by one of the hosts. It includes private information useful only to this host, and the identification of the next host in the agent´s itinerary
Keywords
cryptography; distributed programming; protocols; authentic communications; certification authority; cryptographic keys; encrypted entry sequence; hierarchical structure; host identification; itinerary security; mobile agents; nonrepudiation protocol; private information; secret communications; trusted authority; Business; Cryptography; Graphics; Mobile agents; Proposals; Protection; Protocols; Runtime environment; Security; Telecommunication traffic;
fLanguage
English
Publisher
ieee
Conference_Titel
Security Technology, 1999. Proceedings. IEEE 33rd Annual 1999 International Carnahan Conference on
Conference_Location
Madrid
Print_ISBN
0-7803-5247-5
Type
conf
DOI
10.1109/CCST.1999.797954
Filename
797954
Link To Document