Mobile Agents and the Deus Ex Machina

This paper aims to examine the benefits the introduction of trusted computing can bring to the mobile agent paradigm, with a specific emphasis on mobile agent security.

[1]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[2]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[3]  Levente Buttyán,et al.  Introducing Trusted Third Parties to the Mobile Agent Paradigm , 2001, Secure Internet Programming.

[4]  Siani Pearson Trusted Agents that Enhance User Privacy by Self-Profiling , 2002 .

[5]  Aaron Weiss Trusted computing , 2006, NTWK.

[6]  Volker Roth,et al.  Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.

[7]  Munindar P. Singh,et al.  Agents on the Web: Mobile Agents , 1997, IEEE Internet Comput..

[8]  James E. White,et al.  Mobile Agents , 1997, Lecture Notes in Computer Science.

[9]  Siani Pearson How trusted computers can enhance privacy preserving mobile applications , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[10]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[11]  Patrick LeBlanc,et al.  Self-Protecting Mobile Agents Obfuscation Report Final report , 2003 .

[12]  Christine Julien,et al.  A secure modular mobile agent system , 2006, SELMAS '06.

[13]  Robert Wahbe,et al.  Efficient software-based fault isolation , 1994, SOSP '93.

[14]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[15]  Stephen Crane Privacy Preserving Trust Agents , 2004 .