Protecting Mobile Agent Itineraries

Mobile agents are believed to be playing an important role in future e-commerce systems, offering great flexibility and improved performance. Mobile agents are processes which can autonomously migrate from host to host. The migration path followed by an agent can be abstracted for programming convenience into an itinerary. A flexible structure of itinerary is used in Concordia or Ajanta Agent Systems, using sequence, alternative, and set entries.

[1]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[2]  C. Stefanelli,et al.  Mobile agents protection in the Internet environment , 1999, Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032).

[3]  David Wong,et al.  Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.

[4]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[5]  Dirk Westhoff,et al.  Methods for Protecting a Mobile Agent's Route , 1999, ISW.

[6]  Dirk Westhoff,et al.  Protecting a Mobile Agent's Route against Collusions , 1999, Selected Areas in Cryptography.

[7]  Markus Straßer,et al.  Providing Reliable Agents for Electronic Commerce , 1998, Trends in Distributed Systems for Electronic Commerce.

[8]  Winfried Lamersdorf,et al.  Trends in Distributed Systems for Electronic Commerce , 1998, Lecture Notes in Computer Science.

[9]  Carles Sierra,et al.  Agent-Mediated Electronic Commerce , 2004, Autonomous Agents and Multi-Agent Systems.

[10]  Joan Borrell,et al.  Implementation of Secure Architectures for Mobile Agents in MARISM-A , 2002, MATA.

[11]  Giovanni Vigna,et al.  Mobile Agents and Security , 1998, Lecture Notes in Computer Science.

[12]  Kwangjo Kim,et al.  Information Security and Cryptology — ICISC 2001 , 2002, Lecture Notes in Computer Science.

[13]  James E. White,et al.  Mobile Agents , 1997, Lecture Notes in Computer Science.

[14]  N. Asokan,et al.  Protecting the computation results of free-roaming agents , 1998, Personal Technologies.

[15]  Friedemann Mattern,et al.  Agent Systems, Mobile Agents, and Applications , 2000, Lecture Notes in Computer Science.

[16]  Anand R. Tripathi,et al.  Security in mobile agent systems , 1998 .

[17]  Volker Roth Programming Satan's Agents , 2001, Electron. Notes Theor. Comput. Sci..

[18]  Volker Roth,et al.  Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.

[19]  Andreu Riera,et al.  Securing the itinerary of mobile agents through a non-repudiation protocol , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[20]  Joan Borrell,et al.  Protecting General Flexible Itineraries of Mobile Agents , 2001, ICISC.

[21]  Jan Vitek,et al.  Secure Internet Programming , 1999 .

[22]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[23]  Volker Roth,et al.  On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection , 2001, Mobile Agents.

[24]  E. Horlait Mobile Agents for Telecommunication Applications , 2003, Lecture Notes in Computer Science.

[25]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[26]  Volker Roth,et al.  Encrypting Java Archives and Its Application to Mobile Agent Security , 2001, AgentLink.

[27]  Jianying Zhou Non-Repudiation in Electronic Commerce , 2002, DEXA Workshops.

[28]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[29]  James Lyle Peterson,et al.  Petri net theory and the modeling of systems , 1981 .

[30]  Günter Karjoth,et al.  Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces , 2000, ASA/MA.