Abstract | ||
---|---|---|
In a mobile agent based distributed system, agents must survive malicious failures of the hosts they visit, and they must be resilient to the potentially hostile actions of other hosts. The replication and voting are necessary to survive malicious behavior by visited hosts. However, faulty hosts that are not visited by agents can confound a naive replica management scheme by spoofing. This problem can be solved by cryptographic protocols. This paper describes the role of cryptographic methods in the protocols for the MARE architecture, which is a fault-tolerant mobile agent replication system. In this system, secret sharing takes on an important role in facilitating mobile processes by distributed authentication. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1007/11424826_28 | ICCSA |
Keywords | Field | DocType |
malicious behavior,secret sharing,malicious failure,important role,mobile process,mare protocol,faulty host,cryptographic method,cryptographic protocol,mobile agent,fault-tolerant mobile agent replication,mare architecture,distributed system,fault tolerant | Mobile computing,Secret sharing,Authentication,Cryptographic protocol,Spoofing attack,Computer security,Cryptography,Computer science,Mobile agent,Computer network,Fault tolerance,Distributed computing | Conference |
Volume | ISSN | ISBN |
3481 | 0302-9743 | 3-540-25861-2 |
Citations | PageRank | References |
0 | 0.34 | 12 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kyeongmo Park | 1 | 1 | 2.06 |