Learn More
Agent technology gives many promises for future IT-systems, but little privacy related problems in this technology have been resolved. This paper addresses the privacy problems in agent technology and provides several solutions to overcome some of these problems. It is shown that if an encryption algorithm is used in a different form, it can also provide(More)
Mobile code is code that can be executed at a remote location, where beforehand it might not be known whether this location is trustworthy and a requirement may be that the to be executed code is encrypted and remains encrypted during execution. This paper presents a model of mobile code and defines perfect secrecy. The model and definition allows to derive(More)
Mobile code is software code that may be run at a remote location, which is possibly untrustworthy. This paper provides a secrecy model for mobile code based on Shannon's information theoretic model. Due to different characteristics of mobile code, such as the possibility of plaintext-attacks and untrustworthy execution environments, a new definition for(More)
This paper presents an electronic patient record (EPR) security scheme that covers the privacy of patients and health care practitioners (HCPs). The scheme is designed such that it provides HCP's privacy towards another HCP but revealable in disputes. Forward signature and encryption schemes are used to provide EPR integrity and confidentiality(More)
  • 1