Skip to main content

Realization of an Agent-Based Certificate Authority and Key Distribution Center

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 1699))

Abstract

Security issues are key factors for the deployment and acceptance of agent based systems in the telecommunication area. This fact is most obvious in electronic commerce applications, where security services have to be offered. These services are needed to ensure secure communication, fair exchange of goods and payment. Public key cryptography techniques are an often employed mechanism. Keys are distributed by using a certificate to store them and to provably associate them to a principal. This document deals with the design of an agent-based certificate authority (CA) and key distribution center (KDC).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sahin Albayrak and Dirk Wieczorek. Jiac — an open and scalable agent architecture for telecommunication applications. In H. Velthuijsen and S. Albayrak, editors, Intelligent Agents in Telecommunications Applications — Basics, Tools, Languages and Applications. IOS Press, Van Diemenstraat 94, 1013 CN Amsterdam, The Netherlands, January 1997. ISBN 90 5199 295 5.

    Google Scholar 

  2. Alfred Arsenault and Sean Turner. Internet X.509 Public Key Infrastructure PKIX Roadmap. Located at http://www.ietf.org/internet-drafts/draft-ietf-pkixroadmap-00.txt, September 1998. PKIX Working Group. Internet Draft.

  3. Graham Hamilton (Editor). JavaBeansTM Version 1.01, July 1997.

    Google Scholar 

  4. Tim Finin and Jay Weber et al. Draft specification of the KQML agent comminication language. Located at http://www.cs.umbc.edu/kqml/kqmlspec/spec.html, June 15 1993.

  5. FIPA. FIPA 98 Specification Part No.10, Version 1.0 Agent Security Management. Located at http://www.fipa.org, October 1998. FIPA-Foundation for Intelligent Physical Agents.

  6. Alan O. Freier, Philip Karlton, and Pail C. Kocher. The SSL Protocol Version 3.0. Located at http://home.netscape.com/eng/ssl3/index.html, March 1996.

  7. Li Gong. Implementing Protection Domains in the Java Development Kit™ 1.2. In Proceedings of the Internet Society Symposium on Network and Distributed System Security, pages 125–134, San Diego, California, March 1998.

    Google Scholar 

  8. Li Gong. Secure Java Class Loading. IEEE Internet Computing, 2(6):56–61, November/December 1998.

    Article  Google Scholar 

  9. Li Gong, Marianne Mueller, Hemma Prafullchandra, and Roland Schemers. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit™ 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems, pages 102–112, Monterey, California, December 1997.

    Google Scholar 

  10. James Gosling, Bill Joy, and Guy Steele. The Java Language Specification. Located at http://java.sun.com/docs/books/jls/html/index.html, 1996. Sun Microsystems, Inc.

  11. IAIK-JCE. Located at http://jcewww.iaik.tu-graz.ac.at/. IAIK Java Security, Institute for Applied Information Processing and Communications, Graz University of Technology.

  12. ITU-T. Recommentation X.509: The Directory-Authentication Framework, June 1997.

    Google Scholar 

  13. Java™ Cryptography Architecture API Specification & Reference. Located at http://java.sun.com/products/jdk/1.2/docs/guide/security/CryptoSpec.html, October 1998. Sun Microsystems, Inc.

  14. Java™ Cryptography Extension 1.2-API Specification & Reference. Located at http://java.sun.com/products/jce/. Sun Microsystems, Inc.

  15. Steve Kent. RFC 1422 Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-based Key Management, February 1993.

    Google Scholar 

  16. RSA Laboratories. PKCS#10: Certificate Request Syntax Standard. Located at http://www.rsa.com/rsalabs/pubs/PKCS/, November 1993.

  17. Sheng Liang and Gilad Bracha. Dynamic Class Loading in the Java Virtual Machine. To appear in the 13th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications OOPSLA’98, October 1998. ACM.

    Google Scholar 

  18. Tim Lindholm and Frank Yellin. The JavaTM Virtual Machine Specification. Located at http://java.sun.com/docs/books/vmspec/html/VMSpecTOC.doc.html, September 1996. Sun Microsystems, Inc.

  19. Bruce Schneier. Applied Cryptography. Joh Wiley & Sons, Inc, 2nd edition, 1996.

    Google Scholar 

  20. TeleSec. Analyse einer TTP-Message. Located at http://www.telesec.de, Dezember 1998. Deutsche Telekom AG.

  21. Chelliah Thirunavukkarasu, Tim Finin, and James Mayfield. Secret Agents — A Security Architecture for the KQML Agent Communication Language. Draft submitted to the CIKM’95 Intelligent Information Agents Workshop, October 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bsufka, K., Holst, S., Schmidt, T. (1999). Realization of an Agent-Based Certificate Authority and Key Distribution Center. In: Albayrak, S. (eds) Intelligent Agents for Telecommunication Applications. IATA 1999. Lecture Notes in Computer Science(), vol 1699. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48165-6_8

Download citation

  • DOI: https://doi.org/10.1007/3-540-48165-6_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66539-7

  • Online ISBN: 978-3-540-48165-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics