參考文獻 |
[1] P.A. Bonatti, S. Kraus, and V.S. Subrahmanian, ``Secure Agents,' Tech. Report CS-TR-4068, Dept. of Computer Science, University of Maryland, October 1999.
[2] S. Loureiro, ``Mobile Code Protection,' Ph.D. thesis, Institut Eurecom, Sophia Antipolis & ENST Paris, France, January 2001.
[3] R. Guttman, A. Moukas, and P. Maes, ``Agent-mediated electronic commerce:A survey,' Knowledge Engineering Review, June 1998.
[4] Bruce Krulwich, ``Automating the internet: Agents as user surrogates,' IEEE Internet Computing, 1(4): 34-38, July-August 1997.
[5] W. Farmer, J. Guttman, and V. Swarup, ``Security for Mobile Agents: Authentication and State Appraisal,' In Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS '96), pp. 118-130, September 1996.
[6] B.S. Yee, ``A Sanctuary for Mobile Agents,' In Proceedings of DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997.
[7] B.S. Yee, ``A Sanctuary for mobile Agents,' In Proceedings of Fourth International Workshop (MOS '98), Lecture Notes in Computer Science, vol. 1603, pp. 261-273, 1999.
[8] G. Karjoth, N. Asokan, and C. Gulcu, ``Protecting the Computation Results of Free-Roaming Agents,' In Proceedings of Second International Workshop on Mobile Agents (MA '98), Lecture Notes in Computer Science, vol. 1477, pp. 195-207, 1998.
[9] V. Roth, ``On the Rrobustness of some Cryptographic Protocols for Mobile Agent Protection,' In Proceedings of Fifth International Conference on Mobile Agents (MA 2001), Lecture Notes in Computer Science, vol. 2240, pp. 1-14, 2001.
[10] G. Karjoth, ``Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces,' In Proceedings of Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents (ASA/MA2000), Lecture Notes in Computer Science, vol. 1882, pp. 44-56, 2000.
[11] Jeff S.L. Cheng and V.K. Wei, ``Defenses against the Truncation of Computation Results of Free-Roaming Agents,' In Proceedings of Fourth International Conference on Information and Communication Security (ICICS 2002), Lecture Notes in Computer Science, vol. 2513, pp. 1-12, 2002.
[12] P. Maggi and R. Sisto, ``A Configurable Mobile Agent Data Protection Protocol,' In Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS '03), ACM, pp. 851-858, 2003.
[13] V. Roth, ``Programming Satan's Agent,' Electronic Notes in Theoretical Computer Science, vol. 63, Elsevier, 2001.
[14] D. Chaum and Eugene Van Heyst, ``Group Signature,' In Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 257-265, 1991.
[15] R.L. Rivest, A. Shamir, and Y. Tauman ``How to Leak a Secret,' In Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science, vol. 2248, pp. 552-565, 2001.
[16] A. Shamir, ``Identity-Bbased Cryptosystems and Signature Schemes ,' In Advances in Cryptology - CRYPTO '84, Lecture Notes in Computer Science, vol. 196, pp. 47-53, 1985.
[17] H. Krawczy and T. Rabin, ``Chameleon Signatures,' In Proceedings of the Network and Distributed System Security Symposium (NDSS 2000), 2000.
[18] G. Ateniese and B. de Medeiros, ``Identity-Based Chameleon Hash and Applications,' In Proceedings of Financial Cryptography 2004, Key West, Florida, USA, 2004.
[19] B. Lee, H. Kim, and K. Kim, ``Secure Mobile Agent Using Strong Non-designated Proxy Signature,' In Proceedings of the Sixth Australasian Conference on Information Security and Privacy (ACISP 2001), Lecture Notes in Computer Science, vol. 2119, pp. 474-486, 2001.
[20] P. Kotzanikolaou, M. Burmester, and V. Chrissikopoulos, ``Secure Transactions with Mobile Agents in Hostile Environments,' In Proceedings of the Fifth Australian Conference (ACISP 2000), Lecture Notes in Computer Science, vol. 1841, pp. 289-297, 2000.
[21] N. Mitrovic and U.A. Arribalzaga, ``Mobile Agent Security Using Proxy-Agents and Trusted Domains,' In Proceedings of the Second International Workshop on Security of Mobile Multiagent Systems (SEMAS 2002), pp. 81-83, 2002.
[22] D.-G. Lee, I.-Y. Lee, J.-K. Ahn, and Y.-H. Kong, ``The Illegal Copy Protection Using Hidden Agent,' In Proceedings of the First Eurasian Conference on Information and Communication Technology (EurAsia-ICT 2002), Lecture Notes in Computer Science, vol. 2510, pp. 832-841, 2002.
[23] G. Brassard, D. Chaum, and C. Crepeau, ``Minimum Disclosure Proofs of Knowledge,' Journal of Computer and System Sciences, vol. 37, pp. 156-189, 1988.
[24] D. Boneh and M. Franklin, ``Identity-Based Encryption from the Weil Pairing,' In Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 213-229, 2001.
[25] N. Borselius, ``Mobile Agent Security,' Journal of Electronics $&$ Communication Engineering, vol. 14, no. 5, IEE, London, UK, pp. 211-218, October 2002.
[26] E. Bresson, J. Stern, and M. Szydlo, ``Threshold Ring Signatures and Applications to Ad-hoc Groups,' In Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computer Science, vol. 2442, pp. 465-480, 2002.
[27] D. Chaum and H.V. Antwerpen, ``Undeniable Signatures,' In Advances in Cryptology - CRYPTO '89, Lecture Notes in Computer Science, vol. 435, pp. 212-217, 1989.
[28] J. Camenisch, ``Efficient and generalized group signatures,' In Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, vol. 1233, pp. 465-479, 1997.
[29] Anthony H.W. Chan and M.R. Lyu, ``Security Modeling and Evaluation for the Mobile Code Paradigm,' In Proceedings of 1999 Asian Computing Science Conference (ASIAN '99), pp. 371-372, Phuket, Thailand, December 1999.
[30] Y. Desmedt and M. Yung, ``Weaknesses of Undeniable Signature Schemes,' In Advances in Cryptology - CRYPTO '91, Lecture Notes in Computer Science, vol. 576, pp. 205-220, 1991.
[31] S. Fischmeister, ``Building Secure Mobile Agents: The Supervisor-Worker Framework,' Master thesis, Distributed Systems Group, Technical University of Vienna}, February 2000.
[32] A. Fujioka, T. Okamoto, and K. Ohta, ``Interactive bi-proof Systems and Undeniable Signature Schemes,' In Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 243-256, 1991.
[33] F. Hohl, ``A Model of Attacks of Malicious Hosts Against Mobile Agents,' In Proceedings of the ECOOP Workshop on Distributed Object Security and Fourth Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pp. 105-120, INRIA, France, 1998.
[34] W. Jansen and T. Karygiannis, ``NIST Special Publication 800-19 - Mobile Agent Security,' National Institute of Standards and Technology, 2000.
[35] D. Kotz, R. Gray, and D. Rus, ``Future Directions for Mobile-Agent Research,' Tech. Report TR2002-415, Dept. of Computer Science, Dartmouth College, Jan. 2002.
[36] H. Krawczy and T. Rabin, ``Chameleon Hashing and Signatures,' 1997, available at http://eprint.iacr.org/1998/010.ps
[37] N. Karnik and A. Tripathi, ``Security in the Ajanta Mobile Agent SYstem,' Software - Practice and Experience, vol. 31, no. 4, pp 301-329, 2001.
[38] S. Loureiro, R. Molva, and A. Pannetrat, ``Secure Data Collection with Updates,' Journal of Electronic Commerence Research, vol. 1, no. 1/2, pp. 119-130, 2001.
[39] J. Mir and J. Borrell, ``Protecting General Flexible Itineraries of Mobile Agents,' In Proceedings of the Fourth International Conference Seoul on Information Security and Cryptology (ICISC 2001), Lecture Notes in Computer Science, vol. 2288, pp. 382-396, 2002.
[40] K.G. Paterson, ``ID-Based Signatures from Pairings on Elliptic Curves,' available at http://eprint.iacr.org/2002/004/
[41] T. Pedersen, ``Distributed Provers with Applications to Undeniable Signatures,' In Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 221-242, 1991.
[42] J.-Y. Park, D.-I. Lee, and H.-H. Lee, ``Data Protection in Mobile Agents: One-Time Key Based Approach,' In Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, IEEE, pp. 411-418, 2001.
[43] V. Roth, ``Mutual Protection of Co-operating Agents,' In Proceedings of Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science, vol. 1603, pp. 275-285, 1999.
[44] N.P. Smart, ``An Identity-Based Authenticated Key Agreement Protocol Based on The Weil Pairing,' Electronics Letters, 38(13): 630-632, 2002.
[45] T. Sander and C.F. Tschudin ``Protecting Mobile Agents Against Malicious Hosts,' In Proceedings of the 1998 IEEE Symposium of Research in Security and Privacy, Lecture Notes in Computer Science, vol. 1419, pp. 44-60, 1998.
[46] H.K. Tan and L. Moreau, ``Certificates for Mobile Code Security,' In Proceedings of the 17th ACM Symposium on Applied computing (SAC 2002), pp. 76-81, Madrid, Spain, 2002.
[47] G. Vigna ``Protecting Mobile Agents through Tracing,' In Proceedings of the Third ECOOP Workshop on Operating System support for Mobile Object Systems, pp. 137-153, 1997.
[48] G. Vigna ``Cryptographic Traces for Mobile Agents,' In Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, pp. 137-153, 1998.
[49] C.-K. Wu, ``Electronic Supermarket for Mobile Agents,' In Proceedings of the Fourth World Multi-Conference on Systemics, Cybernetics and Informatics (SCI2000), vol. 3, pp. 371-379, Orlando, Florida, USA, 2000. |