[BUKU][B] Active bundles for protecting confidentiality of sensitive data throughout their lifecycle

LB Othmane - 2010 - search.proquest.com
Protecting confidentiality of shared sensitive data requires satisfying conflicting needs for
disseminating data and preventing unauthorized data disclosures. We propose a solution …

Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile agents

V Gunupudi, SR Tate - … Conference on Financial Cryptography and Data …, 2008 - Springer
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols,
including general secure function evaluation (SFE) protocols. However, interaction is a …

Verifiable distributed oblivious transfer and mobile agent security

S Zhong, YR Yang - Proceedings of the 2003 joint workshop on …, 2003 - dl.acm.org
The mobile agent is a fundamental building block of the mobile computing paradigm. In
mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the …

[PDF][PDF] On garbled circuits and constant round secure function evaluation

SR Tate, K Xu - CoPS Lab, University of North Texas, Tech. Rep, 2003 - Citeseer
In this paper, we examine a form of garbled (or encrypted) circuit introduced by Beaver,
Micali, and Rogaway as part of their design of a constant-round secure function evaluation …

SAgent: a security framework for JADE

V Gunupudi, SR Tate - Proceedings of the fifth international joint …, 2006 - dl.acm.org
This paper presents SAgent, a general-purpose mobile agent security framework that is
designed to protect the computations of mobile agent applications in potentially hostile …

Security in large-scale open distributed multi-agent systems

MA Oey, M Warnier, FMT Brazier - Autonomous Agents, 2010 - books.google.com
Designing large-scale distributed multi-agent systems that operate in open environments,
such as the Internet, creates new challenges, especially with respect to security issues …

Enforcing security in the agentscape middleware

TB Quillinan, M Warnier, M Oey, R Timmer… - Proceedings of the 2008 …, 2008 - dl.acm.org
Multi Agent Systems (MAS) provide a useful paradigm for accessing distributed resources in
an autonomic and self-directed manner. Resources, such as web services, are increasingly …

[PDF][PDF] Mobile Agent Data Integrity Using Multi-agent Architecture.

JT McDonald, A Yasinsac, WC Thompson III - PDCS, 2004 - soc.usouthal.edu
Protection of agent data state and partial results in mobile agent systems continues to draw
research interest. Current solutions to integrity attacks are geared at detection of malicious …

[PDF][PDF] Possible Attacks on and Countermeasures for Secure Multi-Agent Computation.

R Endsuleit, A Wagner - Security and Management, 2004 - researchgate.net
Possible Attacks on and Countermeasures for Secure Multi-Agent Computation Page 1
Possible Attacks on and Countermeasures for Secure Multi-Agent Computation Regine …

[PDF][PDF] Trust in mobile agent systems

JT McDonald, A Yasinsac, W Thompson - Florida State University, Tech …, 2005 - cs.fsu.edu
The protection of mobile agent systems continues to be an active area of research that will
enable future applications to utilize this paradigm of computing. Agent systems and mobile …