TITLE

Punishing Malicious Hosts with the Cryptographic Traces Approach

AUTHOR(S)
Esparza, Oscar; Muñoz, Jose L.; Soriano, Miguel; Forné, Jordi
PUB. DATE
October 2006
SOURCE
New Generation Computing;2006, Vol. 24 Issue 4, p351
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The use of mobile agents seems the natural way to improve the network conditions to provide an easy access to future services. Unfortunately, there are some security constraints that avoid a massive use of mobile agents systems. The protection of mobile agents against the attacks of malicious hosts is considered by far the most difficult security problem to solve in mobile agent systems. This paper introduces some techniques that aim to solve the problem of the malicious hosts. This paper improves some aspects of the most widely known attack detection technique, the cryptographic traces approach. This approach presents some major drawbacks that can be solved by means of a Suspicious Detection Protocol. Additionally, this paper introduces some other protocols that can be used to punish the malicious host by using a Third Trusted Party, the Host Revocation Authority.
ACCESSION #
22711775

 

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics