Abstract
IPR (Intellectual Property Rights) protection is one of the key elements to be considered in the development of mobile code technologies (applets, agents, etc.) due to the mobile nature of this kind of software and the power of servers. The absence of protection would increase the risk of piracy to such a level that the economy of this sector would be weakened, perhaps even destroyed. Complementary to the legal provisions (anti-piracy laws), IPR protection is one of the absolute elements in the development of these new markets. In the course of ESPRIT project FILIGRANE (F1exIbLe IPR for Software AGent ReliANcE), we developed an integrated Web architecture and associated security framework and protocol for the trading of mobile code in Internet. The term mobile code includes all kinds of mobile Java software (applets and agents and Java beans, cardlets, etc.).
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35413-2_36
Chapter PDF
Similar content being viewed by others
Keywords
References
RSA Laboratories, “Cryptographic message syntax standard,” Public Key — Cryptography Standards 7, RSA Laboratories, Redwood City, CA, USA, 1993. Available at URL: ftp://ftp.rsa.com/pub/pkcs/
Denny Lang, seven good reasons for mobile Agents, and Mitsuru Oshima, Communications of the ACM, March 1999, volume 42, pages 88–89
Volker Roth and Mehrdad Jalali, Concepts and Architecture of a Security-centric Mobile Agent Server, Fifth International Symposium on Autonomous Decentralized Systems, March 26–28, 2001 Dallas, Texas, U.S.A, to appear in IEEE proceedings of the Conference
Mehrdad Jalali-Sohi, Commercial Agent Based Visual Mining in Internet, submitted to the Iternational Conference on Inernet Computing (IC-2001). 25–28 June, Las Vegas, U.S.A.
Mehrdad Jalali-Sohi and Hellene Mamikonyan, An Application of Intelligent Agents for Retail Visual Mining and E-Commerce In Internet, submitted to 14th International Conference COTIM 2001 (Conference On Telecommunications and Information Markets).
Mehrdad Jalali-Sohi, FILIGRANE (FlexlbLe 1PR for Software AGent ReliANcE) protocol, A security protocol for trading of mobile code in Internet, 6th International Conference on Information Systems, Analysis and Synthesis (ISAS) 23rd to 26th of July 2000 Orlando, U.S.A
Tod Papaioannou, Doctoral Dissertation, On the Structuring of Distributed Systems: The Argument of Mobility, Loughborough University February 2000
OCTALIS (Offer of Contents through Trusted Access LinkS), http://www.igd.fhg.de/igd-a8/projects/octalis/octalis_en.html
IMPRIMATUR, ESPRIT Project, Project Number 20676, http://www.imprimatur.alcs.co.uk/
Julien P.Stern, Gael Hachez, Fracois Koeune, Jean-Jacques Quisquater, Robust Object Watermarking: Application to Code, In Proceedings of InfoHiding °99, LNCS 1768, pp. 368–378, Sep. 1999
Volker Roth and Mehrdad Jalali, Access Control and Key Management for Mobile Agents, Computer & Graphics, Vol. 22, No. 4, pp. 457–461, 1998
Gl M. Kutter and F. Hartung, Introduction to watermarking techniques. Chapter 5 of S. Katzenbeisser and F. Petitcolas, editors. Information Hiding: techniques for steganography and digital watermarking, 220 pages, Artech House, 2000
G2 C. Collberg, C. Thomborson and D. Low, Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs, ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL98), January 1998
G3 C. Collberg and C. Thomborson, On the limits of Software Watermarking, Technical Report #164, Department of Computer Science, The University of Auckland, August 1998
G4 C. Collberg and C. Thomborson, Software Watermarking: Models and Dynamic Embeddings, ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), January 1999
G5 R. Venkatesan, V. Vazirani and S. Sinha. A Graph Theoretic Approach to Software Watermarking. DIMACS Workshop on Management of Digital Intellectual Property. April 2000.
N. Johnson and S. Katzenbeisser. A survey of steganographic techniques. Chapter 3 of S. Katzenbeisser and F. Petitcolas, editors. Information Hiding: techniques for steganography and digital watermarking. 220 pages. Artech House. 2000
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Jalali-Sohi, M., Foka, R., Hachez, G., Beitlich, A. (2001). An Integrated Secure Web Architecture For Protected Mobile Code Distribution. In: Steinmetz, R., Dittman, J., Steinebach, M. (eds) Communications and Multimedia Security Issues of the New Century. IFIP — The International Federation for Information Processing, vol 64. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35413-2_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-35413-2_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4811-6
Online ISBN: 978-0-387-35413-2
eBook Packages: Springer Book Archive