Computer Science – Cryptography and Security
Scientific paper
2000-10-09
Computer Science
Cryptography and Security
7 pages, 0 PostScript figures, uses IEEE/LaTeX macros IEEEtran.{bst|cls}
Scientific paper
Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile agent, could modify (by changing or removing) retrieved data. The data management model proposed in this work allows the information collected by the agents to be protected against handling by other hosts in the information network. It has been done by using standard public-key cryptography modified to support protection of data in distributed environments without requiring an interactive protocol with the host that has dropped the agent. Their significance stands on the fact that it is the first model that supports a full-featured protection of mobile agents allowing remote hosts to change its own information if required before agent returns to its originating server.
Rodriguez Diego
Sobrado Igor
No associations
LandOfFree
A Public-key based Information Management Model for Mobile Agents does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with A Public-key based Information Management Model for Mobile Agents, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A Public-key based Information Management Model for Mobile Agents will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-722610