loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Bartek Gedrojc 1 ; Jan C.A. van der Lubbe 1 and Martin van Hensbergen 2

Affiliations: 1 Delft University of Technology, Netherlands ; 2 Fox-IT Forensic IT Experts, Netherlands

ISBN: 978-989-8111-12-8

Keyword(s): Mobile Agents, Secret Sharing, Threshold Signature, Hash Chaining, Untrustworthy Hosts, Private Computing.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Information and Systems Security ; Mobile Code & Agent Security

Abstract: Consider the problem of using mobile agents within an e-commerce setting where the goal is to purchase a desired item for a user. The problem is that the mobile agents visit a collection of hosts which are untrustworthy and therefore could tamper with the correct execution of the agents. Our approach to the e-commerce problem prevents the hosts to retrieve the price the user is willing to pay for a desired item, it prevents the hosts to retrieve the offers given by other hosts (confidentiality) and it ensures the integrity of the agents’ code, the query and itinerary. The key to our approach is the use of multiple agents for our goal; to purchase a desired item for a user. Analogous to a beehive, the user creates Drone agents that can collect data but which do not have the capability to process this data. Also, one Queen agent is deployed which uses the outputs of the Drone agents and makes a decision on that data. Simplified, we let the Drone agents do the work, while the Queen compu tes the result. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.210.22.132

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Gedrojc B.; C.A. van der Lubbe J.; van Hensbergen M. and (2007). PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS.In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 289-294. DOI: 10.5220/0002127402890294

@conference{secrypt07,
author={Bartek Gedrojc and Jan {C.A. van der Lubbe} and Martin {van Hensbergen}},
title={PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={289-294},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002127402890294},
isbn={978-989-8111-12-8},
}

TY - CONF

JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS
SN - 978-989-8111-12-8
AU - Gedrojc, B.
AU - C.A. van der Lubbe, J.
AU - van Hensbergen, M.
PY - 2007
SP - 289
EP - 294
DO - 10.5220/0002127402890294

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.