Czasopismo
Tytuł artykułu
Warianty tytułu
Bezpieczeństwo systemów mobilnych agentów - przegląd
Języki publikacji
Abstrakty
The aim of this paper is to provide an overview of security issues facing mobile agentsystems, and discuss ways of responding to them. We explore the state of the art, to assess if it is mature enough for use in real-life security-critical applications like contract signing or electronic transactions. (original abstract)
Celem niniejszej pracy jest dokonanie przeglądu problemów bezpieczeństwa systemów mobilnych agentów, jak również niektórych metod radzenia sobie z nimi. Dokonaliśmy przeglądu aktualnego stanu wiedzy, by ocenić, czy jest wystarczająco zaawansowany, aby sprostać zastosowaniom, dla których bezpieczeństwo jest warunkiem sine qua non (takim jak podpisywanie kontraktów lub elektroniczne pieniądze). (abstrakt oryginalny)
Rocznik
Strony
600--608
Opis fizyczny
Twórcy
Bibliografia
- Beaver D., Micali S., Rogaway P. (1990), The Round Complexity of Secure Protocols, Proceedings of the twenty-second annual ACM symposium on Theory of computing, pp. 503-513.
- Bettelli A. (2003), The Trustworthiness in Software Agents' Electronic Signatures Proceedings of LEA 2003: 2nd Workshop on the Law and Electronic Agents, pp. 81-95.
- Binder W., Roth V. (2002), Secure Mobile Agent Systems Using Java - Where Are We Heading? Proceedings of 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS).
- Brenner W., Zarnekow R., Wittig H., Schubert C. (1998), Intelligent Software Agents, Springer--Verlag.
- Di Martino В., Rana O.F.(2003), Grid Performance and Resource Management using Mobile Agents, [in:] Getov, V. et. al. (eds.) Performance Analysis and Grid Computing, Kluwer, 2003.
- Galant V., Tyburcy J. (2001), Inteligentny Agent Programowy, Prace Naukowe AE Wroclaw nr 891, pp. 46 - 57, in Polish.
- Hartvigsen G., Helme A., Johansen S. (1995), A Secure System Architecture for Software Agents: The Virtual Secretary Approach, BROADCAST (Basic Research On Advanced Distributed Computing: from Algorithms to SysTems) Technical Report.
- Hendler J. (2001), Agents and Semantic Web, IEEE Intelligent Systems Journal, 16 (2), pp. 30-37.
- Hongying L. (2001), A Comparative Survey of Java Obfuscators Available on the Internet, http:// www.cs.auckIand.ac.nz/~cthombor/Students/hlai/.
- Jennings N.R. (2001), An Agent-Based Approach For Building Complex Software Systems, Communications of the ACM, 44 (4), pp. 35-41.
- Jennings N.R., Wooldridge M. (1995), Intelligent Agents: Theory and Practice, The Knowledge Engineering Review, pp. 115-152.
- Jennings N.R., Wooldridge M. (1998), Applications Of Intelligent Agents, Springer-Verlag, NY, Agent technology: foundations, applications, and markets, pp. 3-28.
- Kirn S., Petsch M., Lees В. (1999), Intelligent Software Agents: Security Issues of a New Technology, Information Security Management: Global Challenges in the New Millennium, Dhillon G. ed., eh. 11.
- Loureiro S., Molva R., Roudier Y. (2000), Mobile Code Security, Proceedings of ISYPAR 2000 (4ème Ecole d'Informatique des Systèmes Parallèles et Répartis), Code Mobile.
- Maes P. (1994), Agents that Reduce Work and Information Overload, Communications of the ACM, 37(7), pp. 31-40.
- Menezes A., van Oorschot P., Vanstone S. (1996), Handbook of Applied Cryptography, CRC Press, CRC Press, Boca Raton, USA.
- Page, J., Zaslavsky, A., Indrawan, M. (2004), A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios, Proceedings of Second Australasian Information Security Workshop (AISW2004), pp. 17-25.
- Paprzycki M., Abraham A. (2003), Agent Systems Today: Methodological Considerations, Proceedings of the 2003 International Conference on Management of e-Commerce and e-Government, Jangxi Science and Technology Press, Nanchang, China, pp. 416-421.
- Riordan J., Schneier B. (1998), Environmental Key Generation towards Clueless Agents, Mobile Agents and Security, G. Vigna, ed., Springer-Verlag, pp. 15-24.
- Roth V. (1999), Mutual Protection of Co-Operating Agents, red. J. Vitek, C. Jensen, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Lecture Notes In Computer Science vol. 1603, pp. 275-285.
- Roth V. (2002), Empowering Mobile Software Agents, Proceedings of 6th IEEE Mobile Agents Conference, Suri N, ed., Lecture Notes in Computer Science, vol. 2535, pp. 47-63.
- Roth V. (2003), Cryptographic Protection of Migratory Software, NebraskaCERT Conference.
- Sander T., Tschudin C. (1997), Towards Mobile Cryptography, International Computer Science Institute Technical Report 1997-049.
- Sander T., Tschudin C. (1998), Protecting Mobile Agents Against Malicious Hosts. Lecture Notes in Computer Science 1419, pp. 44.
- Tate S., Xu K. (2003), Mobile Agent Security Through Multi-Agent Cryptographic Protocols, Proceedings of the 4th International Conference on Internet Computing (1C 2003), pp. 462-468.
- Tate S., Xu K. (2003), On Garbled Circuits and Constant Round Secure Function Evaluation, Computer Privacy and Security Lab, Department of Computer Science, University of North Texas, Technical Report 2003-02.
- Von Ahn L., Blum M., Hopper N., Langford J. (2003), CAPTCHA: Using Hard AI Problems for Security, Advances in Cryptology, Eurocrypt 2003.
- Wilhelm U., Staamann S., Buttyán L. (1998) Protecting the Itinerary of Mobile Agents, Proceedings of the ECOOP Workshop on Distributed Object Security.
- Yee B. (1997), A Sanctuary for Mobile Agents, Technical Report CS97-537, Department of Computer Science and Engineering, UC San Diego.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000064007410