Full metadata record
DC FieldValueLanguage
dc.contributor.authorLESZCZYNA RAFALen_GB
dc.contributor.authorGORSKI Janusz Kazimierzen_GB
dc.date.accessioned2010-02-25T18:37:24Z-
dc.date.available2006-11-03en_GB
dc.date.available2010-02-25T18:37:24Z-
dc.date.issued2006en_GB
dc.date.submitted2006-03-08en_GB
dc.identifier.citationProceedings of the 15th EICAR Annual Conference p. 26-37en_GB
dc.identifier.urihttp://publications.jrc.ec.europa.eu/repository/handle/JRC32814-
dc.description.abstractAmong various computational models to accommodate the mobile wireless computing paradigm, the mobile agent model has major technological advantages. Moreover, our research shows that the model has some unique features which, if used appropriately, may support user privacy. We therefore propose a security protocol for mobile agents aiming at user untraceability. We have performed a basic security analysis of the protocol and evaluated its performance. We have also implemented it, made it available to users, and applied it to an e-health service. In this paper, we present an enhanced security study of the protocol. As far as we know, such systematised study has not yet been performed. Additionally, known analyses limit their interest to particular attackers (internal attackers). We believe that the attack checklist which we developed to evaluate our protocol, may serve as a helpful reference for authors of other protocols. The paper is also addressed to designers and administrators of mobile agent systems who consider provision of user untraceability within their systems.en_GB
dc.description.sponsorshipJRC.G.6-Sensors, radar technologies and cybersecurityen_GB
dc.format.mediumPrinteden_GB
dc.languageENGen_GB
dc.publisherESAT Ecole Supérieure et d'Application des Transmissionsen_GB
dc.relation.ispartofseriesJRC32814en_GB
dc.titleAn Untraceability Protocol for Mobile Agents and Its Enhanced Security Studyen_GB
dc.typeArticles in periodicals and booksen_GB
JRC Directorate:Space, Security and Migration

Files in This Item:
There are no files associated with this item.


Items in repository are protected by copyright, with all rights reserved, unless otherwise indicated.