(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
- 1 February 2003
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Internet Technology
- Vol. 3 (1), 28-48
- https://doi.org/10.1145/643477.643479
Abstract
This article investigates if and how mobile agents can execute secure electronic transactions on untrusted hosts. An overview of the security issues of mobile agents is first given. The problem of untrusted (i.e., potentially malicious) hosts is one of these issues, and appears to be the most difficult to solve. The current approaches to counter this problem are evaluated, and their relevance for secure electronic transactions is discussed. In particular, a state-of-the-art survey of mobile agent-based secure electronic transactions is presented.Keywords
This publication has 37 references indexed in Scilit:
- Countermeasures for mobile agent securityComputer Communications, 2000
- Digital signature with one-time pair of keysElectronics Letters, 2000
- Mobile agents and the future of the internetACM SIGOPS Operating Systems Review, 1999
- Seven good reasons for mobile agentsCommunications of the ACM, 1999
- X-Cash: Executable digital cashPublished by Springer Nature ,1998
- Protecting the computation results of free-roaming agentsLecture Notes in Computer Science, 1998
- Ensuring the integrity of agent-based computations by short proofsLecture Notes in Computer Science, 1998
- On the security of server-aided RSA protocolsPublished by Springer Nature ,1998
- Sliding encryption: A cryptographic tool for mobile agentsLecture Notes in Computer Science, 1997
- Security problems in the TCP/IP protocol suiteACM SIGCOMM Computer Communication Review, 1989