Corpus ID: 16239455

Experiments on Formal Verification of Mobile Agent Data Integrity Properties

@inproceedings{Maggi2002ExperimentsOF,
  title={Experiments on Formal Verification of Mobile Agent Data Integrity Properties},
  author={P. Maggi and R. Sisto},
  booktitle={WOA},
  year={2002}
}
This paper explores the possibility of applying existing verification techniques and tools to the cryptographic mechanisms specifically designed for the protection of mobile agents from their environment, with a particular emphasis on agent data integrity. In a previous paper we explored the use of the CSPbased tools FDR and Casper. Here, instead, we present our experience with a prototype of a new verification tool based on spicalculus. The symbolic techniques employed in this new tool make it… Expand
Agents Based e-Commerce and Securing Exchanged Information
  • R. Al-Jaljouli, J. Abawajy
  • Computer Science
  • Pervasive Computing, Innovations in Intelligent Multimedia and Applications
  • 2010
TLDR
This chapter describes robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. Expand
Boosting m-business using a truly secured protocol for data gathering mobile agents
  • R. Al-Jaljouli
  • Computer Science
  • International Conference on Mobile Business (ICMB'05)
  • 2005
TLDR
This paper presents an accurate security protocol for data gathering mobile agents, and proves its correctness by verifying the security properties: authenticity, confidentiality, and strong integrity using STA, an infinite-state exploration formal method. Expand
The agent migration and fault-tolerance management in dynamic network security system
TLDR
A novel agent fault-tolerance migration mechanism realised by integrity verification is presented, and a Combined Agent Migration and Fault-Tolerance Strategy (CAMFS) is presented according to the agent characteristics in a dynamic network security system. Expand
The construction of a novel agent fault-tolerant migration model
TLDR
By simulation experiment, the results prove that the model provided by the paper is feasible and efficient, and can save network resource much than other relative works. Expand
Defend mobile agent against malicious hosts in migration itineraries
TLDR
A novel agent migration fault-tolerance model based on integrity verification is presented, which can defend mobile agent against malicious hosts in migration itineraries effectively and reduce the complexity and resource cost of agent migration communication. Expand
Formal Methods in the Enhancement of the Data Security Protocols of Mobile Agents
This invention provides means for transferring a person from a stationary place to a movable stretcher using a flexible and foldable transfer sheet attached to such stretcher.
Mobile-agent based multi-constraint one-to-many bilateral e-Negotiation framework
The thesis proposes a multi-constraint one-to-many bilateral e-Trade negotiation framework. It deploys mobile agents in negotiation, considers trading competition between vendors and search space,Expand
The Construction and Analysis of Agent Fault-Tolerance Model Based on pi-Calculus
TLDR
The paper constructs a novel agent migration fault-tolerance model based on integrity verification (AMFIV), which can reduce the complexity degree of agent communication and agent replicas amount so that network and time resource can be much saved. Expand

References

SHOWING 1-10 OF 19 REFERENCES
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study
TLDR
This work focuses attention on data integrity properties and shows how the techniques used for classical message-based protocols such as authentication protocols can be applied to mobile agent systems as well. Expand
A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification
TLDR
This work introduces a different technique which can overcome this drawback by allowing users to carry out the verification task in a completely automatic way by bounding the replication of parallel processes to a finite number, and using an abstract representation of all explicitly allowed values in interactions between the spi process and the environment. Expand
Verifying authentication protocols with CSP
  • S. Schneider
  • Computer Science
  • Proceedings 10th Computer Security Foundations Workshop
  • 1997
TLDR
A specific theory appropriate to the analysis of authentication protocols is developed, built on top of the general CSP semantic framework, to combine the ability to express protocols in a natural and precise way with the facility to reason formally about the properties they exhibit. Expand
Casper: a compiler for the analysis of security protocols
  • G. Lowe
  • Computer Science
  • Proceedings 10th Computer Security Foundations Workshop
  • 1997
TLDR
Casper is described, a program that automatically produces the CSP description from a more abstract description, thus greatly simplifying the modelling and analysis process. Expand
Casper: a compiler for the analysis of security protocols
TLDR
Casper is described, a program that automatically produces the CSP description from a more abstract description, thus greatly simplifying the modelling and analysis process. Expand
Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study
TLDR
It is shown how a specification technique initially conceived only for classical cryptographic protocols can be used in the context of mobile agents as well by using spi calculus, an extension of calculus with cryptographic properties. Expand
Using CSP to Detect Errors in the TMN Protocol
TLDR
FDR (Failures Divergence Refinement), a model checker for CSP, is used to detect errors in the TMN protocol and a very general intruder as CSP processes, and test whether the intruder can successfully attack the protocol. Expand
Cryptographic Traces for Mobile Agents
TLDR
This paper presents a mechanism based on execution tracing and cryptography that allows one to detect attacks against code, state, and execution flow of mobile software components. Expand
Security for Mobile Agents: Issues and Requirements
TLDR
This paper investigates new threats from malicious agents and hosts in mobile agent technology and develops a set of achievable security requirements for mobile agent systems. Expand
A calculus for cryptographic protocols: the spi calculus
TLDR
The spi calculus is introduced, an extension of the pi calculus designed for describing and analyzing cryptographic protocols and state their security properties in terms of coarse-grained notions of protocol equivalence. Expand
...
1
2
...