Protecting mobile agents against malicious hosts using trusted computing

dc.accession.numberT00047
dc.classification.ddc005.84 PAN
dc.contributor.advisorMathuria, Anish M.
dc.contributor.authorPanchal, Niravkumar K.
dc.date.accessioned2017-06-10T14:36:56Z
dc.date.accessioned2025-06-28T10:22:27Z
dc.date.available2017-06-10T14:36:56Z
dc.date.issued2005
dc.degreeM. Tech
dc.description.abstractThe concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed to the desired extent. Security concerns associated with mobile agent systems are primary obstacles to their widespread adoption. Protecting mobile agent against malicious host is the unsolved aspect of these security concerns. Existing solutions to this problem are either not practical or not robust. We have provided a practical and robust solution to this problem using the concepts of Trusted Computing. We have designed security architecture for mobile agent systems. Our architecture uses the capabilities of the TCG (Trusted Computing Group) TPM (Trusted Platform Module) and TCG based integrity measurement architecture to provide the solution to the above mentioned problem. Since most of the mobile agent systems are Java based, we have provided an implementation of TCG aware Java Virtual Machine, which is one component of the overall architecture.
dc.identifier.citationPanchal, Niravkumar K. (2005). Protecting mobile agents against malicious hosts using trusted computing. Dhirubhai Ambani Institute of Information and Communication Technology, ix, 50 p. (Acc.No: T00047)
dc.identifier.urihttp://ir.daiict.ac.in/handle/123456789/84
dc.publisherDhirubhai Ambani Institute of Information and Communication Technology
dc.student.id200311023
dc.subjectComputer security
dc.subjectIntelligent agents
dc.subjectMobile agents
dc.subjectMobile agents system
dc.subjectTrusted computing
dc.titleProtecting mobile agents against malicious hosts using trusted computing
dc.typeDissertation

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
200311023.pdf
Size:
248.33 KB
Format:
Adobe Portable Document Format