2010
DOI: 10.1002/sec.158
|View full text |Cite
|
Sign up to set email alerts
|

TPM‐based protection for mobile agents

Abstract: Mobile agent is a promising paradigm for emerging ubiquitous computing and ambient intelligent scenarios. We believe that security is the most important issue for the widespread deployment of applications based on mobile agent technology. Indeed, community agrees that without the proper security mechanisms, use of mobile agent-based applications will be impossible. From our perspective, the security problem in mobile agents is the gathering of two subproblems; the problem of the agent protection and the proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 20 publications
(26 reference statements)
0
8
0
Order By: Relevance
“…However, there will be a lot of uncertainty in this, so many researchers have been studying it. Muñoz and Maña [58,59] as well as Waller et al [60] have been studying cloud computing and mobile security management, and they laid the foundation for the later realization of the interconnection of the transport units in underground mines.…”
Section: Future Workmentioning
confidence: 99%
“…However, there will be a lot of uncertainty in this, so many researchers have been studying it. Muñoz and Maña [58,59] as well as Waller et al [60] have been studying cloud computing and mobile security management, and they laid the foundation for the later realization of the interconnection of the transport units in underground mines.…”
Section: Future Workmentioning
confidence: 99%
“…The existing research team has done a very good job on TPM (trusted platform module), and the research results explain this problem very clearly. This paper will make further thinking based on the research results of this team ( Mana & Munoz, 2006 ; Munoz & Mana, 2011b ; Muoz, Maa & Serrano, 2009 ; Munoz, Mana & Serrano, 2009 ; Munoz et al, 2009 ; Maña & Muñoz, 2007 ; Mu & Fernandez, 2020 ; Muñoz & Lopez, 2018 ; Muñoz & Maña, 2011a ; Muoz, Farao & Correia, 2020 ).…”
Section: Introductionmentioning
confidence: 99%
“…Since the network is typically built on mobile devices, two privacy concerns should be considered in different levels of permission: (1) for permanent nodes, the malicious host problem [16] may reduce the credibility of permission; and (2) for transient nodes, lack of location privacy may expose customer's information in physical world [17]. Some well-studied technologies can be adopted here.…”
mentioning
confidence: 99%
“…Some well-studied technologies can be adopted here. For the first concern, protection based on Trusted Platform Module (TPM) [16,18] can facilitate node authentication as the permission can be identifiable in a hardware level. Furthermore, Abraham et al [19] offered a reference that using TPM in asynchronous model of network consensus.…”
mentioning
confidence: 99%