Protecting mobile agents against malicious hosts using tamper resistant hardware (Japanese)

In: Transactions of the Information Processing Society of Japan   ;  44 ,  6  ;  1613-1624  ;  2003
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

Recently, it is getting possible to make a simple data sharing and exchange among personal computers by advances in computers and wireless communication technology. However, in the existing technology, once a data has been sent to other hosts, it is impossible to control the redistribution of it. In this paper, we propose a data protecting and management method using mobile agents. However, mobile agent can be tampered by malicious hosts. We propose a mobile agent protection method using tamper resistant hardware for public key encryption. The method enables a flexible data management using mobile agents.

Table of contents – Volume 44, Issue 6

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

1483
Secure and efficient mobile agent application development using patterns
Tahara, Y. / Yoshioka, N. / Ohsuga, A. / Honiden, S. | 2003
1509
A generic fine-grained software repository using XML
Yoshida, H. / Yamamoto, S. / Agusa, K. | 2003
1525
An efficient technique for corner-turn in SAR image reconstruction by improving cache access
Izumi, H. / Nakajima, T. / Sato, H. | 2003
1558
A scheduling scheme for waiting time reduction on continuous media data broadcast
Yoshihisa, T. / Tsukamoto, M. / Nishio, S. | 2003
1583
Implementation and evaluation of TCP / IP protocol stack for embedded system
Abe, T. / Yoshimura, H. / Kubo, H. | 2003
1593
Design and implementation of network monitoring circuits for high speed networks
Kirimura, M. / Takamoto, Y. / Mori, T. / Yasumoto, K. / Nakata, A. / Higashino, T. | 2003
1604
Notification of certificate revocation status between different domains under a PKI system
Miyake, Y. / Millen, J.K. / Denker, G. / Tanaka, T. / Nakao, K. | 2003
1613
Protecting mobile agents against malicious hosts using tamper resistant hardware
Haruki, H. / Kawaguchi, N. / Inagaki, Y. | 2003
1635
An educational software supporting learning through group competition using an interactive electronic whiteboard and its effects
Otsuki, Y. / Bandoh, H. / Kato, N. / Nakagawa, M. | 2003