We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Multi-mobile agents' separation scheme in Java Card application for mobile agent's security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ruchuan Wang ; Dept. of Comput. Sci. & Technol., Nanjing Univ. of Posts & Telecommun., China ; Haiping Huang ; Haiyan Wang

As a kind of tamper resistant hardware, Java Card is regarded as a trusted third party that can operate safely on an untrusting host. At the same time, with the development of e-commerce, network management and mobile agent technology, multimobile agents' cooperation can not only improve the efficiency of distributed compute, but more importantly, it has a comprehensive applicative value in solving the security issues of mobile agent system. Aiming at settling the bottleneck of Java Card on mobile agents' congestion, this paper, proposes a multimobile agents' separation scheme in destination host. By a specific example, the paper analyzes the detailed process of this scheme for its security and validity. Furthermore, it provides the architecture of multimobile agents and other applications on how multimobile agents resist attacks primarily from the malicious executing hosts and draws some significant conclusions.

Published in:

Services Computing, 2004. (SCC 2004). Proceedings. 2004 IEEE International Conference on

Date of Conference:

15-18 Sept. 2004