Skip to main content

A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol

  • Conference paper
Cyberspace Security and Defense: Research Issues

Abstract

This paper describes a proposal of a protocol for secure personal content delivery based on a cryptographic mobile agent. The proposed protocol allows a controlled and secured delivery of personal content (e.g., photo, text message, etc.) to the target device. Furthermore, the protocol is enhanced with time-based constraints in order to impose control over point in time when the content becomes available. The preliminary analysis of the protocol is presented and also some practical applications are discussed. The idea of cryptographic mobile agents is briefly explained to give the reader an understanding of the properties of such agents. The research is based upon leading agent standard, the Foundation for Intelligent Physical Agents, and the protocol is specified using Agent Unified Modeling Language. The paper also describes a prototype of mobile agent implementing the proposed protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

14. References

  1. Riordan J. and B. Schneier, “Environmental Key Generation Towards Clueless Agents,” in Vigna G. (ed.), Mobile Agents and Security, LNCS 1419, Springer, Berlin 1998, 15–24

    Google Scholar 

  2. Menezes A.J., van Oorschot, S. A. Vanstone, “Handbook of Applied Cryptography,” CRC Press, Boca Raton, FL, 1997

    Google Scholar 

  3. The Foundation for Intelligent Physical Agents, web page http://www.fipa.org

    Google Scholar 

  4. The Java Agent Development Framework, web page http://jade.cselt.it

    Google Scholar 

  5. The Java Remote Method Invocation, web page http://java.sun.com/products/jdk/rmi

    Google Scholar 

  6. The CORBA Standard, web page http://www.omg.org/gettingstarted

    Google Scholar 

  7. The Lightweight Extensible Agent Platform, web page http://leap.crm-paris.com

    Google Scholar 

  8. Odell J., H. Van Dyke Parunak, and B. Bauer, “Representing Agent Interaction Protocols in UML,” in Ciancarini P., Wooldrige M. (eds.), Agent-Oriented Software Engineering, Springer, Berlin 2001, 121–140

    Google Scholar 

  9. Ianella, R., “Mobile Digital Rights Management,” whitepaper, IPR Systems, 2003, available at http://www.iprsystems.com/whitepapers/Mobile-DRM-WP.pdf

    Google Scholar 

  10. Jansen W.A., “Determining Privileges of Mobile Agents,” National Institute of Standards and Technology, in Proceedings of the Computer Security Applications Conference, December 2001

    Google Scholar 

  11. Ianella R., “Digital Rights Management (DRM) Architectures,” in D-Lib Magazine, vol. 7, nr 6, June 2001, available at http://www.dlib.org/dlib/june01/ianella/06ianella.html

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer

About this paper

Cite this paper

Ziółkowski, B., Stokłosa, J. (2005). A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol. In: Kowalik, J.S., Gorski, J., Sachenko, A. (eds) Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry, vol 196. Springer, Dordrecht. https://doi.org/10.1007/1-4020-3381-8_19

Download citation

  • DOI: https://doi.org/10.1007/1-4020-3381-8_19

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-3379-7

  • Online ISBN: 978-1-4020-3381-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics