Browse > Article
http://dx.doi.org/10.3745/KIPSTB.2002.9B.5.517

A Forgery detection protocol for protection of mobile agent execution results  

Kim, Hee-Yeon (부경대학교 대학원 전자계산학과)
Shin, Jung-Hwa (부경대학교 대학원 전자계산학과)
Shin, Weon (안철수 연구소)
Rhee, Kyung-Hyune (부경대학교 전자컴퓨터정보통신 공학부)
Abstract
Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.
Keywords
mobile agent; forgery detection;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Jim Waldo, 'Mobile code, distributed computing, and a-gents,' IEEE Intelligent Systems, 2001   DOI
2 Wayne A. Jansen, 'Countermeasures for Mobile Agent Security,' Elsevier Science, 2000
3 신정화, '이동코드 보안 모델에 관한 연구', 부경대학교 대학원 석사학위논문, 2000   과학기술학회마을
4 신원, '안전한 이동 에이전트 시스템의 설계와 응용', 부경대학교 대학원 박사학위 논문,2001
5 Michael S. Greenverg, Jennifer C. Byington, 'Mobile Agents and Security,' IEEE Communications Magazine, 1998
6 John E. Canavan, 'Fundamentals of Network Security,' Artech House. INC, 2001
7 김영대, '자바로 구현하는 이동 에이전트 시스템', 프로그램세계, 2000
8 C. Ghezzi and G. Vigna, 'Mobile Code Paradigms and Technologies : A Case Study,' in Proceeding of the First International Workshop on Mobile Agents (MA '97), 1997
9 Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos 'Secure Transactions with Mobile Agents in Hostile Environments,' ACISP 2000, pp.289-297
10 A. Young, M. Yung, 'Sliding Encryption : A Cryptographic Tool for Mobile Agents,' Proc. 4th Int'l Wksp, Fast Software Encryption, FSE
11 G. Vigna, 'Cryptographic Traces for Mobile Agents,' In : G. Vigna (Ed.). Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science 1419, pp.137-153, 1998
12 G. Karjoth, N. Asokan and C. Gulcu, 'Protecting the Computation Results of Free-roaming Agents,' Proceedings of the Second international Workshop, MA'98. pp.195-207, 1998
13 Alfres J. Menezes, Paul C. vaz Oorschot, Scoot A. Vanstone, 'Handbook of Applied Cryptography,' CRC
14 Bennet S. Yee, 'A Sanctuary for Mobile Agents,' Secure Internet Programming, LNCS 1603, Springer-Verlag, pp. 261-274, 1999
15 신원, 이경현, '이동 에이전트 실행 보호를 위한 암호학적 추적 방안', 통신정보보호학회논문지, 제11권 제3호, 2001   과학기술학회마을