Abstract
Mobile agents are software entities that consist of code, data and state, and that can migrate autonomously from host to host executing their code. Despite its benefits, security issues restrict the use of code mobility. The approach that is presented here aids to solve the problem of malicious hosts by using a Trusted Third Party, the Host Revocation Authority. The HoRA controls which are the hosts that acted maliciously in the past. The agent sender must consult the HoRA before sending an agent in order to remove from the agent’s itinerary all the revoked hosts. The HoRA can also revoke a malicious host if the agent sender detects and proves that this malicious host did not act honestly.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
O. Esparza, M. Soriano, J.L. Muñoz, and J. Forné. Limiting the execution time in a host: a way of protecting mobile agents. In IEEE Sarnoff Symposium “Advances in Wired and Wireless Communications”, 2003.
F. Hohl. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
J. Riordan and B. Schneier. Environmental Key Generation Towards Clueless Agents. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
T. Sander and C.F. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
G. Vigna. Cryptographic traces for mobile agents. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Esparza, O., Soriano, M., Muñoz, J.L., Forné, J. (2003). Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. In: Lovelle, J.M.C., Rodríguez, B.M.G., Gayo, J.E.L., del Puerto Paule Ruiz, M., Aguilar, L.J. (eds) Web Engineering. ICWE 2003. Lecture Notes in Computer Science, vol 2722. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45068-8_54
Download citation
DOI: https://doi.org/10.1007/3-540-45068-8_54
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40522-1
Online ISBN: 978-3-540-45068-9
eBook Packages: Springer Book Archive