Skip to main content
Article thumbnail
Location of Repository

Protecting mobile agents ’ data using trusted computing technology

By Xian He-qun and Feng Deng-guo

Abstract

Abstract: Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents ’ data protection. Key words: private key consignment; mobile agent; trusted computing; TPM 1

Year: 2009
OAI identifier: oai:CiteSeerX.psu:10.1.1.134.4756
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.informatics.org.cn/... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.