A Sanctuary for Mobile Agents

The Sanctuary project at UCSD is building a secure infrastructure for mobile agents, and examining the fundamental security limits of such an infrastructure.

[1]  Martín Abadi,et al.  On hiding information from an oracle , 1987, J. Comput. Syst. Sci..

[2]  Robbert van Renesse,et al.  Cryptographic support for fault-tolerant distributed computing , 1996, EW 7.

[3]  Joe Kilian,et al.  A note on efficient zero-knowledge proofs and arguments (extended abstract) , 1992, STOC '92.

[4]  R. Jueneman,et al.  Message authentication , 1985, IEEE Communications Magazine.

[5]  John Black,et al.  Message authentication codes , 2000 .

[6]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[7]  George C. Necula,et al.  Safe kernel extensions without run-time checking , 1996, OSDI '96.

[8]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[9]  Silvio Micali,et al.  CS proofs , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[10]  Scott Oaks,et al.  Java Security , 1998 .

[11]  Steven McCanne,et al.  The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.

[12]  Xiangmin Zhang,et al.  Java Security , 2000 .

[13]  Michael J. Kelly,et al.  Common Cryptographic Architecture Cryptographic Application Programming Interface , 1991, IBM Syst. J..

[14]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[15]  Ivan Damgård,et al.  Linear zero-knowledge—a note on efficient zero-knowledge proofs and arguments , 1997, STOC '97.

[16]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[17]  Robert Wahbe,et al.  Efficient software-based fault isolation , 1994, SOSP '93.

[18]  T. Anderson,et al.  Eecient Software-based Fault Isolation , 1993 .

[19]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .

[20]  Brian N. Bershad,et al.  Extensibility safety and performance in the SPIN operating system , 1995, SOSP.

[21]  Levente Buttyán,et al.  Introducing Trusted Third Parties to the Mobile Agent Paradigm , 2001, Secure Internet Programming.

[22]  Leonid A. Levin,et al.  Checking computations in polylogarithmic time , 1991, STOC '91.

[23]  Mihir Bellare,et al.  XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.

[24]  Joel H. Saltz,et al.  Network-aware mobile programs , 1997 .

[25]  Bennet S. Yee,et al.  Using Secure Coprocessors , 1994 .

[26]  E AndersonThomas,et al.  Efficient software-based fault isolation , 1993 .

[27]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.