Mobile Agents Integrity Research

  • Huanmei Guan
  • Huanguo Zhang
  • Ping Chen
  • Yajie Zhou
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 251)


Mobile agents are an important technology in e-commerce systems and offer new possibilities for the e-commerce applications. This paper examines some mobile agent integrity protocols and proposes a new protecting protocol of mobile agent integrity. It can defend most known attacks, provides encryption transmission and route secrecy of mobile agents.


Mobile Agent Mobile Agent System Integrity Protocol Malicious Host Mobile Agent Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    A. Corradi, M. Cremonini, R. Montanari and C. Stefanelli, Mobile Agents Integrity for Electronic Commerce Applications, Information Systems Vol. 24, No. 6, pp. 519–533 (1999).CrossRefGoogle Scholar
  2. 2.
    D.B. Lange and M. Oshima, Seven Good Reasons for Mobile Agents, Communications of the ACM, 1999, 42(3): 88–89.CrossRefGoogle Scholar
  3. 3.
    W. Jansen, Countermeasures for Mobile Agent Security, Computer Communications, 2000, 23(17): 1667–1676.CrossRefGoogle Scholar
  4. 4.
    S. Fünfrocken, Protecting Mobile Web-Commerce Agents with Smartcards, First International Symposium on Agent Systems and Applications (ASA’99)/Third International Symposium on Mobile Agents (MA’99), Palm Springs (1999).Google Scholar
  5. 5.
    D. Westhoff, et al, Protecting a Mobile Agent’s Route against Collusions, Proceedings of SAC’99, San Antonio: Springer-Verlag, 1999: 215–226.Google Scholar
  6. 6.
    M. Giansiracusa, Mobile Agent Protection Mechanisms and the Trusted Agent Proxy Server (TAPS) Architecture, (2003). Scholar
  7. 7.
    P. J. Hardjono and J. Seberry, Fundamentals of Computer Security, Springer-Verlag, Berlin (2003).MATHGoogle Scholar
  8. 8.
    B. S. Yee, A Sanctuary for Mobile Agents, Proceedings of Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Berlin: Springer-Verlag, 1999: 261–273.Google Scholar
  9. 9.
    G. Karjoth, N. Asokan, and C. Gülcü, Protecting the Computation Results of Freeroaming Agents, Proceedings of the 2nd International Workshop on Mobile Agents (MA’ 98), Stuttgart: Springer-Verlag, 1998: 195–207.Google Scholar
  10. 10.
    J.S.L. Cheng and K.W. Victor, Defenses against the Truncation of Computation Results of Free-roaming Agents, Proceedings of the 4th International Conference on Information and Communications Security, Singapore: Springer-Verlag, 2002: 1–12.Google Scholar
  11. 11.
    X. Darren, An improved free-roaming mobile agent security protocol against colluded trunation attack, Proceedings of the 30th Annual International Computer Software and Applications Conference (2006).Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Huanmei Guan
    • 1
    • 2
  • Huanguo Zhang
    • 2
    • 3
  • Ping Chen
    • 1
  • Yajie Zhou
    • 1
  1. 1.Computer CenterWuhan UniversityWuhanChina
  2. 2.College of ComputerWuhan UniversityWuhanChina
  3. 3.The State Key Laborary of Software EngineeringWuhan UniversityWuhanChina

Personalised recommendations