Abstract
This paper describes a proposal of a protocol for secure personal content delivery based on a cryptographic mobile agent. The proposed protocol allows a controlled and secured delivery of personal content (e.g., photo, text message, etc.) to the target device. Furthermore, the protocol is enhanced with time-based constraints in order to impose control over point in time when the content becomes available. The preliminary analysis of the protocol is presented and also some practical applications are discussed. The idea of cryptographic mobile agents is briefly explained to give the reader an understanding of the properties of such agents. The research is based upon leading agent standard, the Foundation for Intelligent Physical Agents, and the protocol is specified using Agent Unified Modeling Language. The paper also describes a prototype of mobile agent implementing the proposed protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
14. References
Riordan J. and B. Schneier, “Environmental Key Generation Towards Clueless Agents,” in Vigna G. (ed.), Mobile Agents and Security, LNCS 1419, Springer, Berlin 1998, 15–24
Menezes A.J., van Oorschot, S. A. Vanstone, “Handbook of Applied Cryptography,” CRC Press, Boca Raton, FL, 1997
The Foundation for Intelligent Physical Agents, web page http://www.fipa.org
The Java Agent Development Framework, web page http://jade.cselt.it
The Java Remote Method Invocation, web page http://java.sun.com/products/jdk/rmi
The CORBA Standard, web page http://www.omg.org/gettingstarted
The Lightweight Extensible Agent Platform, web page http://leap.crm-paris.com
Odell J., H. Van Dyke Parunak, and B. Bauer, “Representing Agent Interaction Protocols in UML,” in Ciancarini P., Wooldrige M. (eds.), Agent-Oriented Software Engineering, Springer, Berlin 2001, 121–140
Ianella, R., “Mobile Digital Rights Management,” whitepaper, IPR Systems, 2003, available at http://www.iprsystems.com/whitepapers/Mobile-DRM-WP.pdf
Jansen W.A., “Determining Privileges of Mobile Agents,” National Institute of Standards and Technology, in Proceedings of the Computer Security Applications Conference, December 2001
Ianella R., “Digital Rights Management (DRM) Architectures,” in D-Lib Magazine, vol. 7, nr 6, June 2001, available at http://www.dlib.org/dlib/june01/ianella/06ianella.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer
About this paper
Cite this paper
Ziółkowski, B., Stokłosa, J. (2005). A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol. In: Kowalik, J.S., Gorski, J., Sachenko, A. (eds) Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry, vol 196. Springer, Dordrecht. https://doi.org/10.1007/1-4020-3381-8_19
Download citation
DOI: https://doi.org/10.1007/1-4020-3381-8_19
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-3379-7
Online ISBN: 978-1-4020-3381-0
eBook Packages: Computer ScienceComputer Science (R0)