In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses methods for protecting an agent's route information from being misused by sites en route interested in gaining insight into the profile of the agent’s owner or in obstructing the owner's original goal. Our methods provide visited sites with just a minimum of route information, but on the other hand allow sites to detect modifying attacks of preceding sites. Though, under noncolluding attacks, all methodes presented provide a similar level of protection, they differ w.r.t. performance and the points of time when an attack can be detected.
CITATION STYLE
Westhoff, D., Schneider, M., Unger, C., & Kaderali, F. (1999). Methods for protecting a mobile agent’s route. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1729, pp. 57–71). Springer Verlag. https://doi.org/10.1007/3-540-47790-x_7
Mendeley helps you to discover research relevant for your work.