Learn More
Agent technology gives many promises for future IT-systems, but little privacy related problems in this technology have been resolved. This paper addresses the privacy problems in agent technology and provides several solutions to overcome some of these problems. It is shown that if an encryption algorithm is used in a different form, it can also provide(More)
Mobile code is code that can be executed at a remote location, where beforehand it might not be known whether this location is trustworthy and a requirement may be that the to be executed code is encrypted and remains encrypted during execution. This paper presents a model of mobile code and defines perfect secrecy. The model and definition allows to derive(More)
In the vision of an ambient intelligent world, innumerable small interconnected devices will surround us and support us in our daily tasks and while at leisure. To do so, these devices need to know and exchange our personal preferences. Moreover, without any built-in countermeasures these devices are more than able to collect much more private information.(More)
Mobile code is software code that may be run at a remote location, which is possibly untrustworthy. This paper provides a secrecy model for mobile code based on Shannon's information theoretic model. Due to different characteristics of mobile code, such as the possibility of plaintext-attacks and untrustworthy execution environments, a new definition for(More)
This paper presents an electronic patient record (EPR) security scheme that covers the privacy of patients and health care practitioners (HCPs). The scheme is designed such that it provides HCP's privacy towards another HCP but revealable in disputes. Forward signature and encryption schemes are used to provide EPR integrity and confidentiality(More)
  • 1