Repositórios Seguros de Dados para Proteção de Agentes Móveis contra Plataformas Maliciosas

  • Michelle S. Wangham UFSC
  • Joni da Silva Fraga UFSC
  • Rafael J. Deitos UFSC
  • Galeno A. Jung UFSC

Abstract


This work defines a security scheme that reduces the risks to which mobile agents are exposed when they visit malicious platforms. The scheme is composed of three secure data repositories that ensure integrity of stored data. In addition, two of these repositories also provide data confidentiality.

References

Chess, D. M. (1998). Security issues in mobile code systems. Em Vigna, G., editor, Mobile Agents and Security, volume LNCS 1419. Springer.

Corradi, A., Cremonini, M., Montanari, R., e Stefanelli, C. (1999). Mobile agents integrity for electronic commerce applications. Information Systems, 24(6):519–533.

Hohl, F. (1998). Time limited blackbox security: Protecting mobile agents from malicious hosts. Em Vigna, G., editor, Mobile Agents and Security, volume LNCS 1419, paginas 92–113. Springer.

Jansen, W. e Karygiannis, T. (1999). Mobile agent security. Relatorio Tecnico NIST Special Publication 800-19, National Institute os Standards and Technology.

Karjoth, G., asokan, N., e C.Gulcu (1998). Protecting the computing results of free-roaming agents. Em Proc. of the Second International Workshop on Mobile Agents.

Karnik, N. (1998). Security in Mobile Agent System. Tese de Doutorado, University of Minnesota.

OMG (2000). Mobile agent facility specification. OMG Document 2000-01-02.

Roth, V. (2001). On the robustness of some cryptographic protocols for mobile agent protection. Em Picco, G. P., editor, Mobile Agents, volume LNCS 2240, paginas 1–14. Springer.

Sander, T. e Tschudin, C. (1998). Protecting mobile agens against malicious hosts. Em Vigna, G., editor, Mobile Agents and Security, volume LNCS 1419. Springer.

Schneider, F. B. (1997). Towards fault-tolerant and secure agentry. Em Mavronicolas, M. e Tsigas, P., editors, 11th International Workshop on Distributed Algorithms (WDAG’97), volume Lecture Notes in Computer Science, paginas 1–14. Springer.

Tardo, J. e Valente, L. (1996). Mobile agent security and telescript. Em IEEE COMPCON’96, paginas 58–63. IEEE Computer Society Press.

Vigna, G. (1998a). Cryptographic traces for mobile agents. Em Vigna, G., editor, Mobile Agents and Security, volume LNCS 1419, paginas 137–153. Springer.

Vigna, G., editor (1998b). Mobile Agents and Security, volume LNCS 1419. Springer.

Wangham, M. e Fraga, J. (2003). Mecanismos de seguranca para plataformas de agentes moveis, baseados em redes de confianca spki/sdsi. Em Simposio Brasileiro de Redes de Computadores.
Published
2004-05-10
WANGHAM, Michelle S.; FRAGA, Joni da Silva; DEITOS, Rafael J.; JUNG, Galeno A.. Repositórios Seguros de Dados para Proteção de Agentes Móveis contra Plataformas Maliciosas. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 4. , 2004, Gramado. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2004 . p. 59-70. DOI: https://doi.org/10.5753/sbseg.2004.21226.

Most read articles by the same author(s)

1 2 3 > >>