[livres divers classés par sujet] [Informatique] [Algorithmique] [Programmation] [Mathématiques] [Hardware] [Robotique] [Langage] [Intelligence artificielle] [Réseaux]
[Bases de données] [Télécommunications] [Chimie] [Médecine] [Astronomie] [Astrophysique] [Films scientifiques] [Histoire] [Géographie] [Littérature]

A Protocol to Detect Malicious Hosts Attacks by Using Reference States

contributor Verteilte Systeme (IPVR)
creator Hohl, Fritz
date 1999-08
description 17 pages
To protect mobile agents from attacks by their execution environments, or hosts, one class of protection mechanisms uses "reference states" to detect modification attacks. Reference states are agent states that have been produced by non-attacking, or reference hosts. This paper presents a new protocol using reference states by modifying an existing approach, called "traces". In contrast to the original approach, this new protocol offers a model, where the execution on one host is checked unconditionally and immediately on the next host, regardless of whether this host is trusted or untrusted. This modification preserves the qualitative advantages like asynchronous execution, but also introduces two new problems: input to the execution session on one host cannot be held secret to a second host, and collaboration attacks of two consecutive hosts are possible. The overhead needed for the protocol roughly doubles the cost of the mobile agent execution.
format application/pdf
identifier  http://www.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=TR-1999-09&engl=1
language ger
publisher Stuttgart, Germany, Universität Stuttgart
relation Technical Report No. 1999/09
source ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/TR-1999-09/TR-1999-09.pdf
subject Data Encryption (CR E.3)
Operating Systems Security and Protection (CR D.4.6)
Computer-Communication Networks (CR C.2)
Distributed Artificial Intelligence (CR I.2.11)
Security and Protection (CR K.6.5)
mobile
agents
security
title A Protocol to Detect Malicious Hosts Attacks by Using Reference States
type Text
Technical Report