• Corpus ID: 16239455

Experiments on Formal Verification of Mobile Agent Data Integrity Properties

@inproceedings{Maggi2002ExperimentsOF,
  title={Experiments on Formal Verification of Mobile Agent Data Integrity Properties},
  author={Paolo Maggi and Riccardo Sisto},
  booktitle={WOA},
  year={2002}
}
This paper explores the possibility of applying existing verification techniques and tools to the cryptographic mechanisms specifically designed for the protection of mobile agents from their environment, with a particular emphasis on agent data integrity. In a previous paper we explored the use of the CSPbased tools FDR and Casper. Here, instead, we present our experience with a prototype of a new verification tool based on spicalculus. The symbolic techniques employed in this new tool make it… 

Figures from this paper

Agents Based e-Commerce and Securing Exchanged Information

  • R. Al-JaljouliJ. Abawajy
  • Computer Science
    Pervasive Computing, Innovations in Intelligent Multimedia and Applications
  • 2010
TLDR
This chapter describes robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks.

Boosting m-business using a truly secured protocol for data gathering mobile agents

  • R. Al-Jaljouli
  • Computer Science
    International Conference on Mobile Business (ICMB'05)
  • 2005
TLDR
This paper presents an accurate security protocol for data gathering mobile agents, and proves its correctness by verifying the security properties: authenticity, confidentiality, and strong integrity using STA, an infinite-state exploration formal method.

The agent migration and fault-tolerance management in dynamic network security system

TLDR
A novel agent fault-tolerance migration mechanism realised by integrity verification is presented, and a Combined Agent Migration and Fault-Tolerance Strategy (CAMFS) is presented according to the agent characteristics in a dynamic network security system.

The construction of a novel agent fault-tolerant migration model

TLDR
By simulation experiment, the results prove that the model provided by the paper is feasible and efficient, and can save network resource much than other relative works.

Defend mobile agent against malicious hosts in migration itineraries

Formal Methods in the Enhancement of the Data Security Protocols of Mobile Agents

This invention provides means for transferring a person from a stationary place to a movable stretcher using a flexible and foldable transfer sheet attached to such stretcher.

Mobile-agent based multi-constraint one-to-many bilateral e-Negotiation framework

TLDR
A multi-constraint one-to-many bilateral e-Trade negotiation framework that deploys mobile agents in negotiation, considers trading competition between vendors and search space, accurately evaluates offers, and truly maintains the security of negotiation data is proposed.

The Construction and Analysis of Agent Fault-Tolerance Model Based on pi-Calculus

TLDR
The paper constructs a novel agent migration fault-tolerance model based on integrity verification (AMFIV), which can reduce the complexity degree of agent communication and agent replicas amount so that network and time resource can be much saved.

References

SHOWING 1-10 OF 16 REFERENCES

Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study

TLDR
This work focuses attention on data integrity properties and shows how the techniques used for classical message-based protocols such as authentication protocols can be applied to mobile agent systems as well.

Verifying authentication protocols with CSP

  • S. Schneider
  • Computer Science
    Proceedings 10th Computer Security Foundations Workshop
  • 1997
TLDR
A specific theory appropriate to the analysis of authentication protocols is developed, built on top of the general CSP semantic framework, to combine the ability to express protocols in a natural and precise way with the facility to reason formally about the properties they exhibit.

Casper: a compiler for the analysis of security protocols

  • G. Lowe
  • Computer Science, Biology
    Proceedings 10th Computer Security Foundations Workshop
  • 1997
TLDR
Casper is described, a program that automatically produces the CSP description from a more abstract description, thus greatly simplifying the modelling and analysis process.

Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study

TLDR
It is shown how a specification technique initially conceived only for classical cryptographic protocols can be used in the context of mobile agents as well by using spi calculus, an extension of calculus with cryptographic properties.

Using CSP to Detect Errors in the TMN Protocol

TLDR
FDR (Failures Divergence Refinement), a model checker for CSP, is used to detect errors in the TMN protocol and a very general intruder as CSP processes, and test whether the intruder can successfully attack the protocol.

Cryptographic Traces for Mobile Agents

TLDR
This paper presents a mechanism based on execution tracing and cryptography that allows one to detect attacks against code, state, and execution flow of mobile software components.

Security for Mobile Agents: Issues and Requirements

TLDR
This paper investigates new threats from malicious agents and hosts in mobile agent technology and develops a set of achievable security requirements for mobile agent systems.

A calculus for cryptographic protocols: the spi calculus

TLDR
The spi calculus is introduced, an extension of the pi calculus designed for describing and analyzing cryptographic protocols and state their security properties in terms of coarse-grained notions of protocol equivalence.

Mobile agents integrity in e-commerce applications

  • Antonio CorradiR. MontanariC. Stefanelli
  • Computer Science
    Proceedings. 19th IEEE International Conference on Distributed Computing Systems. Workshops on Electronic Commerce and Web-based Applications. Middleware
  • 1999
TLDR
This paper focuses on how mobile shopping agents can be protected from malicious behavior of execution sites and describes a distributed multiple-hops integrity protocol integrated in SOMA, that supports secure and open e-commerce applications.

Mobile Agent Security

TLDR
This chapter looks at one of the research topics that, as everybody agrees, is critical for the success of mobile agent technology: security.