PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS

Bartek Gedrojc, Jan C.A. van der Lubbe, Martin van Hensbergen

2007

Abstract

Consider the problem of using mobile agents within an e-commerce setting where the goal is to purchase a desired item for a user. The problem is that the mobile agents visit a collection of hosts which are untrustworthy and therefore could tamper with the correct execution of the agents. Our approach to the e-commerce problem prevents the hosts to retrieve the price the user is willing to pay for a desired item, it prevents the hosts to retrieve the offers given by other hosts (confidentiality) and it ensures the integrity of the agents’ code, the query and itinerary. The key to our approach is the use of multiple agents for our goal; to purchase a desired item for a user. Analogous to a beehive, the user creates Drone agents that can collect data but which do not have the capability to process this data. Also, one Queen agent is deployed which uses the outputs of the Drone agents and makes a decision on that data. Simplified, we let the Drone agents do the work, while the Queen computes the result.

Download


Paper Citation


in Harvard Style

Gedrojc B., C.A. van der Lubbe J. and van Hensbergen M. (2007). PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 289-294. DOI: 10.5220/0002127402890294

in Bibtex Style

@conference{secrypt07,
author={Bartek Gedrojc and Jan C.A. van der Lubbe and Martin van Hensbergen},
title={PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={289-294},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002127402890294},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS
SN - 978-989-8111-12-8
AU - Gedrojc B.
AU - C.A. van der Lubbe J.
AU - van Hensbergen M.
PY - 2007
SP - 289
EP - 294
DO - 10.5220/0002127402890294