Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

A cryptographic mobile agent implementing secure personal content delivery protocol

Authors

[ 1 ] Instytut Automatyki i Inżynierii Informatycznej, Wydział Elektryczny, Politechnika Poznańska | [ P ] employee

Year of publication

2005

Chapter type

paper

Publication language

english

Keywords
EN
  • cryptography
  • mobile agents
  • personal content
  • FIPA
  • AUML
  • DRM
  • JADE
  • JADE-S
  • security
Abstract

EN This paper describes a proposal of a protocol for secure personal content delivery based on a cryptographic mobile agent. The proposed protocol allows a controlled and secured delivery of personal content (e.g., photo, text message, etc.) to the target device. Furthermore, the protocol is enhanced with time-based constraints in order to impose control over point in time when the content becomes available. The preliminary analysis of the protocol is presented and also some practical applications are discussed. The idea of cryptographic mobile agents is briefly explained to give the reader an understanding of the properties of such agents. The research is based upon leading agent standard, the Foundation for Intelligent Physical Agents, and the protocol is specified using Agent Unified Modeling Language. The paper also describes a prototype of mobile agent implementing the proposed protocol.

Pages (from - to)

331 - 345

DOI

10.1007/1-4020-3381-8_19

URL

https://link.springer.com/chapter/10.1007/1-4020-3381-8_19

Book

Cyberspace Security and Defense: Research Issues : Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004

Presented on

NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, 6-9.09.2004, Gdańsk, Poland

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.