Methods for protecting a mobile agent’s route

24Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses methods for protecting an agent's route information from being misused by sites en route interested in gaining insight into the profile of the agent’s owner or in obstructing the owner's original goal. Our methods provide visited sites with just a minimum of route information, but on the other hand allow sites to detect modifying attacks of preceding sites. Though, under noncolluding attacks, all methodes presented provide a similar level of protection, they differ w.r.t. performance and the points of time when an attack can be detected.

Cite

CITATION STYLE

APA

Westhoff, D., Schneider, M., Unger, C., & Kaderali, F. (1999). Methods for protecting a mobile agent’s route. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1729, pp. 57–71). Springer Verlag. https://doi.org/10.1007/3-540-47790-x_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free