In the track of the agent protection: A solution based on cryptographic hardware

1Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The agent-based computing represents a promising paradigm for emerging ubiquitous computing and ambient intelligence scenarios due to the nature of the mobile agents that fit perfectly in these environments. However, the lack of the appropriate security mechanisms is hindering the application of this paradigm in real world applications. The protection of malicious hosts is the most difficult security problem to solve in mobile agent systems. In this paper we describe our solution, which is a mechanism to solve this problem. Our work is based in a new agent migration protocol based on the use of tamper resistant cryptographic hardware. Concretely, we base our work on the use of the Trusted Computing technology. The result of our work is a library built on JADE that implements the secure migration for agents named Secure Migration Library for Agents (SecMiLiA). This library provides a friendly use of the Trusted Computing technology for agent based system developers. © Springer-Verlag 2010.

Cite

CITATION STYLE

APA

Muñoz, A., Maña, A., & Antón, P. (2010). In the track of the agent protection: A solution based on cryptographic hardware. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6258 LNCS, pp. 284–297). https://doi.org/10.1007/978-3-642-14706-7_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free