<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Payment Systems for Mobile Agents Christian Anhalta Stefan Kirna a Universität Hohenheim, 70593 Stuttgart, Germany, canhalt|kirn@uni-hohenheim.de,</article-title>
      </title-group>
      <abstract>
        <p>Future areas of application for mobile agents technology are open, distributed and decentralized networks, where Mobile Agents autonomously perform tasks on behalf of their principals . In this paper, we address the conceptual design of payments for and between Mobile Agents, particularly against the background of the Malicious Host Problem. We analyze the requirements on payment systems for Mobile Agents and give a survey on existing technical solutions partially matching these requirements. We then discuss a new concept that does not require Mobile Agents to hold secrets and that allows allocations of digital coins and agents even in an environment that contains Malicious Hosts. The concept is based on the principles of accounting systems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        Mobile Agents (MoA) are software entities able to migrate autonomously from one host to another (cf.
[
        <xref ref-type="bibr" rid="ref18">22</xref>
        ]). Within the last decade, the paradigm of MoA was discussed broadly and also controversially (cf.
[
        <xref ref-type="bibr" rid="ref35">39</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">11</xref>
        ]). Many suggestions for future fields of application of MoA have been made. [
        <xref ref-type="bibr" rid="ref15">19</xref>
        ] and [
        <xref ref-type="bibr" rid="ref62">66</xref>
        ]
proposed the application of MoA in distributed databases and digital libraries. [
        <xref ref-type="bibr" rid="ref30">34</xref>
        ], [
        <xref ref-type="bibr" rid="ref17">21</xref>
        ] and [
        <xref ref-type="bibr" rid="ref63">67</xref>
        ]
investigated their applicability for intrusion detection; [
        <xref ref-type="bibr" rid="ref25">29</xref>
        ], [
        <xref ref-type="bibr" rid="ref28">32</xref>
        ], [
        <xref ref-type="bibr" rid="ref39">43</xref>
        ] addressed telecommunication
networks, while [4] focused on large sensor networks; [
        <xref ref-type="bibr" rid="ref31">35</xref>
        ] and [
        <xref ref-type="bibr" rid="ref57">61</xref>
        ] proposed software updates and
[
        <xref ref-type="bibr" rid="ref52">56</xref>
        ], [
        <xref ref-type="bibr" rid="ref53">57</xref>
        ] and [
        <xref ref-type="bibr" rid="ref37">41</xref>
        ] information retrieval as fields of appli-cation. MoA perform their tasks in open,
distributed and decentralized networks. They are executed by hosts owned and operated by people
different from the agents’ owners. To accomplish their tasks, MoA migrate between hosts and access
resources (e.g., computing power, but also services such as yellow book services) provided by hosts as
well as other (mobile) agents. Since hosts and MoA are owned by different persons, the need for
coordination of (economic) interests between these principals1 arises.
      </p>
      <p>Setting up payment systems for Mobile Agents (PSMA) is one possible solution to meet these
needs. When designing PSMA, the Malicious Host Problem (MHP) has to be taken into account. The
MHP refers to the inability of MoA to use as well as hide information from hosts executing them (cf.
Section 2). For (secure and tamper-proof) PSMA, this raises questions about their technical feasibility,
since existing electronic payment systems are based on the usage of specific secrets, e.g., private keys.</p>
      <p>
        In this paper, we deal with the design of (secure and tamper-proof) PSMA. According to
requirements on PSMA not complied by other solutions we develop a PSMA subsystem for allocating2
MoA and digital coins. Assuming that the MHP is not adequately solvable yet (cf. [
        <xref ref-type="bibr" rid="ref55">59</xref>
        ]), we avoid
using any secrets held by MoA and address PSMA allocation systems from the perspective of
transparency and self-control. Our concept bases on an accounting web distributed among and
managed by groups of hosts executing the MoA. It is designed as a decentralized and distributed open
system and allows an ex post detection of double-spending and also thievery of coins.
      </p>
      <p>The paper is structured as follows. In Section 2 we discuss PSMA taking into account the MHP. In
Section 3 we analyze the requirements for a PSMA by deducing them from the goals of the principals
(3.1). We give a survey on existing technical concepts possibly suitable for PSMA and discuss them in
view of the requirements that have been identified (3.2). Section 4 describes our allocation concept.
Starting with the assumptions we made in 4.1, we give a rough draft of our concept in 4.2. Section 4.3
1 Within this paper, owners of Mobile Agents or hosts are named principals. Except for the term, there are
no relations to the concept of principals used in the principal-agency theory.
2 With the allocation of MoA and coins, we address the concept of linking at least one coin to one MoA in
a way that only this agent can dispose of the coin.
gives a simple example of the double-spent detection mechanism. We discuss unsolved questions, next
steps of our research and the evaluation of future results in Section 5.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Payment Systems for Mobile Agents and the Malicious Host</title>
    </sec>
    <sec id="sec-3">
      <title>Problem</title>
      <p>
        A PSMA is a system enabling MoA to balance debt and credit. Debt and credit are generated when
agents access resources provided by other agents or hosts, both owned by principals different from
theirs. We assume that principals have economic interests, which they link to the agents or hosts
administrated and owned by them. Thus, PSMA can be seen as systems supporting the (price/market
based) coordination of (economic) interests of principals – MoA pay for access to resources using
digital money provided by their principals. The resource-owning principals receive the money and are
able to either deposit it in their bank accounts or to use it otherwise (cf. Figure 1). Like any kind of
money, the digital information MoA use for payment has to fulfil three functionalities: medium of
exchange, storage of value, and measurement of value. (cf. [
        <xref ref-type="bibr" rid="ref5">9</xref>
        ] [
        <xref ref-type="bibr" rid="ref46">50</xref>
        ]).
      </p>
      <p>Conventional electronic payment systems generally can be grouped into two classes –
token/cashbased or account/check-based electronic payment systems (cf. [1]). Account/check-based systems use
orders signed by the payer and sent to a central clearing institution in order to transfer the specified
amount of money to the payee’s account. Since a clearing institution is involved in each financial
transaction, one of their characteristics are high minimum transaction costs (considering both the
involvement of a third party and high security costs of the clearing server), compared with
token/cashbased systems. Thus, they are unsuitable for nano- and micropayments, which will primarily take place
in future PSMA. Token/cash-based payment systems incur lower transaction costs, especially when
realized as multistage and offline systems (assuming that tampering can be prevented). Thus, they may
be better suited for nano- and micropayments between MoA.</p>
      <p>
        For our work, we focus on PSMA defined as systems consisting of token/cash-based electronic
money (cf. [
        <xref ref-type="bibr" rid="ref13">17</xref>
        ] for definition) that MoA can use for exchange, storage and measurement of value in
open, distributed and decentralized networks.
      </p>
      <p>
        The fact that MoA can be executed by hosts not owned by the same principals leads to the MHP. It
refers to the ability of any agent-executing host to attack the MoA, for example by spying out or
manipulating code, data or execution state (cp. [
        <xref ref-type="bibr" rid="ref9">13</xref>
        ] [
        <xref ref-type="bibr" rid="ref3">7</xref>
        ] [
        <xref ref-type="bibr" rid="ref26">30</xref>
        ], see [
        <xref ref-type="bibr" rid="ref22">26</xref>
        ] for a detailed analysis of the
MHP). As a result, it is not possible for MoA to hide and, at the same time, use information without
risking manipulation or copying of this information by the executing host3.
      </p>
      <p>
        Conventional electronic payment systems use cryptographic methods for generating electronic
money. They rely on secrets held by the payer, the payee and other involved actors. These secrets can
either be private keys used for signature generation and authentication or digital coins (cp. [
        <xref ref-type="bibr" rid="ref42">46</xref>
        ]).
Therefore PSMA build on the basis of existing electronic payment technologies cannot address both
the exchange functionality and the value storage functionality of money. Trying to implement both
functionalities, situations would arise where malicious hosts can copy and/or steal money from MoA,
even with significantly reduced chances for traceability. This is true for conventional payment system
based PSMA as long as no general solution for the MHP exists. It is also independent from the type of
payment system, since both check/account-based and token/cash-based payment systems rely on
secrets.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3 Adaptable technology concepts for PSMA</title>
      <sec id="sec-4-1">
        <title>3.1 Requirements on PSMA</title>
        <p>
          Conventional electronic payment systems can be described by means of a generic (financial) transfer
and role model (cf. [
          <xref ref-type="bibr" rid="ref40">44</xref>
          ]). Within this model, all roles assignable to actors are identified and related to
specific financial transfers, e.g., payment, withdrawal or deposit. In order to identify possible roles
principals can take within a PSMA, we expanded the original model from [
          <xref ref-type="bibr" rid="ref40">44</xref>
          ] to a (financial) transfer
and role model describing PSMA (see figure 1). Thus, we first modeled (financial) transactions
generated by agents upon MoA roles and integrated them into the original model. Then we deduced
additional principal roles involved in the payment circuit.
3 For our work, we will only focus on problems caused by the MHP. Other security issus related to, e.g.,
insecure networks or malicious agents will not be considered.
        </p>
        <p>The names of agent roles have been selected to reflect their position within the payment circuit.
Additionally, we defined a virtual currency area that represents an arbitrary set of (connected) MoA
execution platforms. Agents’ payments are restricted to this currency area.</p>
        <p>According to the roles and their specific position in the financial circuit, we assigned superordinate
goals to each principal’s role. We then decomposed and consolidated these goals from a MoA oriented
perspective, i.e., the principals’ goals were transferred to the MoA as possible. As a result, we obtained
high-level requirements on PSMA.</p>
        <p>Among high-level requirements that are, e.g., related to the general functionality of MoA and
platforms, we identified two groups of high-level requirements important for our work: requirements
related to electronic money per se and requirements related to the allocation of electronic money to
MoA.</p>
        <p>
          The requirements related to electronic money are identical with those defined in literature for
conventional electronic money: identification of counterfeit and double-spent money, non-linkability of
payment and withdrawal, traceability of transactions for the payer and the payee, ex post integrity of
payments, adequate transaction costs, etc. (cf. [
          <xref ref-type="bibr" rid="ref21">25</xref>
          ], [
          <xref ref-type="bibr" rid="ref58">62</xref>
          ]). Important for our works are the requirements
related to the second group, the (one-to-one) allocation of electronic money to MoA. In conventional
electronic payment systems, similarly to real life, unambiguous allocation of coins is realized through
the institute of ownership: someone owns coins and/or specific information and thus has the power of
disposition over them. For MoA, exclusive possession is not possible. Thus, an allocation (sub-) system
based on a different concept but providing equal functionality is needed (which is, of cause, the first
high-level requirement).
        </p>
        <p>The high-level requirements we identified on an allocation system providing one-to-one
allocations are:
• consistency of allocations even by migrations of agents,
• verifiability of allocations, i.e., the ability to identify tampered allocations by MoA, hosts and
principals,
• interchangeability of allocations, i.e., the transfer of allocations from payers to payees,
• robustness of allocations, e.g., their restorability in case of host or connection breakdown,
• divisibility of allocations, unless the allocations are not related to an atomic finance unit.</p>
        <p>These requirements overlap with requirements for electronic money. For instance, while
implementing all required allocation functionalities the requirement “identification of double-spent
money” could also be met as long as verifiability of one-to-one allocations is granted.</p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2 Research related to PSMA</title>
        <p>A final and complete technical solution for the MHP would enable MoA to hide and use secrets. In this
case, conventional electronic payment technology could be used for PSMA. Thus, a literature review
has to consider both explicit work on payment technologies for MoA and implicit work addressing the
MHP directly.</p>
        <p>The implicit research on PSMA can be divided into six groups: research on Mobile Cryptography,
Code Obfuscation, Environmental Key Generation, Internal Hardware Extensions, Reference States
and Signature Delegation techniques for MoA. Explicit research is based upon distributed threshold
schemes (which are also used by some implicit solutions).</p>
        <p>
          The conceptual idea of Mobile Cryptography is to encipher the code and all data of a MoA in a
way so that the agent is still executable in its encoded form. Ideally, the encoded MoA is still able to
handle inputs and outputs without loosing its cryptographic protection. [
          <xref ref-type="bibr" rid="ref44">48</xref>
          ] originally addressed this
idea, ongoing work has been done by [
          <xref ref-type="bibr" rid="ref45">49</xref>
          ], [
          <xref ref-type="bibr" rid="ref33">37</xref>
          ], [
          <xref ref-type="bibr" rid="ref6">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref32">36</xref>
          ] and [
          <xref ref-type="bibr" rid="ref61">65</xref>
          ]. Whereas these approaches focus
only on one host participating in the agents’ execution, [2], [
          <xref ref-type="bibr" rid="ref64">68</xref>
          ], [
          <xref ref-type="bibr" rid="ref51">55</xref>
          ] and [
          <xref ref-type="bibr" rid="ref12">16</xref>
          ] addressed the
integration of additional (semi-trusted) hosts. Within Mobile Cryptography approaches, an allocation
subsystem for PSMA may be build upon the MoA ability to keep secrets. However, there are no
prototype implementations known. Additional research is still needed to protect MoA on a higher level
(cf. [
          <xref ref-type="bibr" rid="ref61">65</xref>
          ]). Also, characteristic of all Mobile Cryptography approaches are very high requirements for
additional computation power, bandwidth and complexity handling compared to “non-encoded” MoA.
Even when these concepts are implemented, high transaction costs will result when using them for
PSMA.
        </p>
        <p>
          Research on Code Obfuscation for MoA has been done by [
          <xref ref-type="bibr" rid="ref23">27</xref>
          ], [
          <xref ref-type="bibr" rid="ref24">28</xref>
          ] and [
          <xref ref-type="bibr" rid="ref38">42</xref>
          ]. Assuming that
obfuscation techniques allow only temporary protection, [
          <xref ref-type="bibr" rid="ref24">28</xref>
          ] proposed to limit the lifetime of MoA
according to the time needed for breaking the obfuscation. [
          <xref ref-type="bibr" rid="ref38">42</xref>
          ] suggested hiding secret sub-programs
in the remaining MoA code. Both approaches would allow implementing allocation subsystems for
PSMA on the basis of temporal secrets. According to the limitation of lifetime, a synchronization
concept that can handle lifecycles of agents, digital coins and allocations would be needed.
Additionally, the question arises whether it is possible to prevent automatic analysis of obfuscated code
(which would lower the lifetime of agents to a few seconds).
        </p>
        <p>
          [
          <xref ref-type="bibr" rid="ref41">45</xref>
          ] proposed and [
          <xref ref-type="bibr" rid="ref20">24</xref>
          ] extended the concept of Environmental Key Generation for MoA,
addressing the idea that a MoA can use, e.g., private keys only when specific environmental
information is available. Based on the comparison of doubled hashed information, this concept may be
suitable for specific, pre-defined one-time-payments, as it allows allocations based on secrets until the
right environment is found. Environmental Key Generation is not suitable for allocations needed in
(multistage) PSMA, as this would require ex-ante knowledge of all future transactions (payer and
payee) of each MoA.
        </p>
        <p>
          [
          <xref ref-type="bibr" rid="ref59">63</xref>
          ], [
          <xref ref-type="bibr" rid="ref60">64</xref>
          ] and [
          <xref ref-type="bibr" rid="ref56">60</xref>
          ] suggested approaches based on Internal Hardware Extensions and Java Cards.
Although these concepts of tamper-proof hosts-in-hosts would allow complying with the requirements
on allocation subsystems, their practical applicability is doubtful since the hosts’ principals would have
to abandon their authority over the hosts. Also, the investment in hardware extension would increase
the transaction costs.
        </p>
        <p>
          The family of Reference States address approaches based on the ex-post comparison of MoA
execution states. Two subclasses can be identified: approaches that deal with the ex-post comparison
by hosts next in the migration route of MoA (cf. [
          <xref ref-type="bibr" rid="ref14">18</xref>
          ], [
          <xref ref-type="bibr" rid="ref36">40</xref>
          ], [
          <xref ref-type="bibr" rid="ref50">54</xref>
          ], [
          <xref ref-type="bibr" rid="ref10">14</xref>
          ], [MaTM–2004], [3]) and
approaches that address the comparison by principals after the MoA have finished their tasks (cf. [
          <xref ref-type="bibr" rid="ref54">58</xref>
          ],
[
          <xref ref-type="bibr" rid="ref2">6</xref>
          ], [
          <xref ref-type="bibr" rid="ref60">64</xref>
          ]). This class of approaches is of limited applicability to PSMA, since reading of data is neither
inhibited nor detectable.
        </p>
        <p>
          The Signature Delegation group consists of undetachable signature (cf. [
          <xref ref-type="bibr" rid="ref29">33</xref>
          ], [
          <xref ref-type="bibr" rid="ref8">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref48">52</xref>
          ], [
          <xref ref-type="bibr" rid="ref4">8</xref>
          ]), proxy
signature (cf. [
          <xref ref-type="bibr" rid="ref43">47</xref>
          ], [
          <xref ref-type="bibr" rid="ref1">5</xref>
          ]) and blind signature concepts (cf. [
          <xref ref-type="bibr" rid="ref16">20</xref>
          ]). These approaches are either insecure
against the MHP (proxy and blind signatures) or restricted to a specific, in detail pre-described use
(undetachable signatures). Thus, for an allocation subsystem the same applicability problem arises as
when using Environmental Key Generation: ex-ante knowledge of all future transactions would be
required.
        </p>
        <p>
          An explicit approach to enable MoA to pay for, e.g., service access is presented by [
          <xref ref-type="bibr" rid="ref11">15</xref>
          ]. Within
his concept, a MoA belongs to a group of n MoA located at different hosts. The MoA cooperate when a
payment is needed. Using a (k,n) threshold scheme (proposed by [
          <xref ref-type="bibr" rid="ref47">51</xref>
          ]), each MoA carries a share of a
secret, in this case a private key, and sends its share to a special MoA when payment is needed. No
malicious host is able to steal or copy electronic money carried by the MoA without getting at least k
shares from the independently migrating agents. The approach is designed for a one-time payment
between a MoA and a host. It requires that the payee host does not execute the MoA. Also, the
protocols only protect the money allocation of paying agents. Payments between two MoA are not
protected by this concept.
        </p>
        <p>Examining the five high-level requirements related to allocation subsystems, we have to note that,
with the exception of Hardware Extensions, none of the outlined concepts is suited to serve as a basis
for a PSMA yet. Either further development and evaluation is needed or the characteristics of the
technology concepts themselves are not suitable for adaptation. For Hardware Extensions, their
practical applicability is questionable.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4 An accounting supported PSMA</title>
      <sec id="sec-5-1">
        <title>4.1 General conditions and basic assumptions</title>
        <p>
          The development of an allocation subsystem for PSMA should take into account general conditions of
MoAs’ environments. By making following assumptions we tried to capture these conditions:
• Within MoAs’ environments, two types of actors can be identified: MoA and (executing)
hosts. Both are able to join and leave the network.
• When a MoA is located on a host, it is not possible to detect what happens to it (e.g., if it is
being copied or analyzed). Hosts have to be interpreted as black boxes, only revealing
information about their internal processes when something leaves the box (cf. [
          <xref ref-type="bibr" rid="ref24">28</xref>
          ]).
• Within MoAs’ environments, the only two ways to (at least partially) control hosts are by
involving other hosts4 (independently from agents executed on them) and, after the task has
been accomplished, by the MoAs’ principals (cf. [
          <xref ref-type="bibr" rid="ref54">58</xref>
          ]).
• MoA cannot keep data, code or execution state secret to the executing hosts and, at the same
time, use it when interaction is required (binding existence of the MHP).
• It is possible for MoA to carry data in a way that anyone can read and add data, but later
manipulations on once written data can be identified (realized by public verifiable integrity,
cf. [
          <xref ref-type="bibr" rid="ref19">23</xref>
          ],[
          <xref ref-type="bibr" rid="ref49">53</xref>
          ].
        </p>
        <p>As basic requirements we assume the existence of the following infrastructure and hosts’ properties:
• Each host joining the environment has a (published) unique identifier (uid).
• A Public Key Infrastructure (PKI) exists, which enables (a) hosts to create and validate digital
signatures (related to their uid), (b) principals to sign their MoA and (c) MoA to transport
secrets for their principals (without using them).
• An anonymization service exists that decouples MoA from their principals. As a result,
everyone can trace MoA and their financial transfers without identifying the principal.
• There is a clearing infrastructure acting as an institution that withdraws and accepts electronic
coins. The clearing infrastructure always knows how much money circulates by balancing
deposited and issued coins.</p>
        <p>
          As far as the last assumption is concerned, we decided to use digital coins according to the
MicroMint micropayment scheme as it has been proposed by [
          <xref ref-type="bibr" rid="ref42">46</xref>
          ]. MicroMint coins consist of a fixed
number of strings (of equal bit-length) producing the same hash value when operated by a specific hash
function. No computing-intensive public-key operations are required. Due to the non-injective and the
collision resistance of the hash function, coin generating for a small number of coins is extremely
expensive, but gets progressively cheaper (per coin) when generating more coins. Since coin
production is economical only with a very large production volume, counterfeiting coins is prevented
as it is uneconomical.
        </p>
        <p>Our basic idea for an allocation subsystem is twofold, addressing both the position of the
allocation subsystem and its openness. As far as position is concerned, the subsystem has to be
managed not at the MoA level, but at the host level. That is, hosts manage the allocations between
MoA and digital coins – they change allocations if MoA pay, verify allocations and manage valid
transfer between each other if MoA migrate. Hosts, i.e., principals operating hosts, have to be
responsible for a valid allocation management. To prevent tampering, hosts have to be real time
controlled by other hosts, for instance, a group of hosts that cooperate for allocation management.
MoAs are integrated in this allocation subsystem only passively for documentation and control. They
carry information about allocations in a way that is not modifiable ex-post. In terms of openness, the
idea is to restrict the PSMA and thus the allocation subsystem so that it is open to MoA and hosts, but
4 This assumtion bases on proposition 1 given in [2].
“closed” to digital coins and allocations. Thus a currency area has to be created. Digital coins have to
be valid only if they are located permanently inside this area. Once they leave the area, coins are not
restorable. As a consequence, the overall amount of money in circulation is constant (or decreasing).
Detection mechanisms are needed to give alert when the amount rises. Double spent coins and the use
of counterfeit coins can thus be avoided.</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2 Abstract concept of an accounting based PSMA allocation system</title>
        <p>Using accounting techniques for a PSMA allocation system, an accounting web for hosts and MoA has
to be created. Normally, accounting systems are kept by one central institution. For PSMA, the
accounting web needs to be both distributed and decentralized, since a centralized design would lead to
higher transaction costs (cf. Section 2). It would also raise the question of (secure) authentication and it
does not comply with the offline characteristics of digital money given in Section 2.</p>
        <p>
          Our concept uses files representing accounts. These account files are made forward secure by
cryptographic methods, i.e., they are designed to enable writing and reading to everyone, but inhibit
(unnoticeable) deletion and manipulation of previously stored information (cf. [
          <xref ref-type="bibr" rid="ref60">64</xref>
          ], [
          <xref ref-type="bibr" rid="ref19">23</xref>
          ], [
          <xref ref-type="bibr" rid="ref49">53</xref>
          ] for
forward and publicly verifiable integrity). The accounts are managed by hosts and are related to groups
of hosts, (single) hosts and MoA. Each financial transaction is recorded by a double-entry registration
in at least two accounts. The accounting web is closed, i.e., no transaction outside of and, even more
important, no transaction back into the accounting web is allowed. The clearing infrastructure is part of
the accounting web. Also, only MoAs are allowed to pay and receive payments and thus own money.
Hosts have to be represented by (non-mobile) agents when they receive or spend money.
        </p>
        <p>Structure of the accounting web: In addition to the account !I related to the clearing
infrastructure, an accounting web is build on the basis of three kinds of account rows5: rows of
accounts !MA related to MoA, rows of accounts !H related to hosts and rows of accounts !G related to
groups of hosts.</p>
        <p>Within an accounting web consisting of only one group G=1 of n hosts and m MoA, n,m " N,
located on these hosts, the following accounts exist:
• ! 1I , the clearing infrastructure account, where all withdrawals and deposits are recorded,
•
•
•
! 1G , the group account, where all input and output transactions of the group G=1 are recorded,
! 1H , ...,! kH , ...,! nH , the hosts’ accounts, where all transaction between hosts (i.e., agents located
at these hosts) are recorded. Each account ! kH is located on and managed by one host. The set
of all hosts’ accounts ! kH that belong to group G=1 is named TGH=1 ,
! 1MA , ...,! iMA , ...,! mMA , the MoA accounts where all transaction between agents are recorded.
Each account ! iMA is related to and located at a MoA and managed by the hosts executing this
agent. The set of all MoA accounts of group G=1 is named TGM=A1 , while the set of all MoA
related to host k is THM=Ak</p>
        <p>Within a group of hosts, the sum of the MoA account row, and the sum the hosts account row and
the group account represent the same value: the total amount of money that exists within this group.</p>
        <p>n m
(1) ! 1G = " ! kH = " ! iMA , where |!| is the sum of all entries of an account ! ,</p>
        <p>k=1 i=1</p>
        <p>Within the accounting web, the sum of all group accounts has to be equal to the sum of the
clearing infrastructure account. For a given one-group accounting web, that is ! 1I = ! 1G . For
accounting webs consisting of o groups, o " N, it has the form:</p>
        <p>o
(2) ! 1I = " ! G</p>
        <p>p
p=1</p>
        <p>As mentioned above, the accounting web has to be open for hosts and MoA. MoA can enter the
accounting web by migrating to a host that is already member of the accounting web and by receiving
an empty or credited account from the clearing infrastructure. When receiving a credited account, the
MoA also receives digital coins (of the same value) from the issuer. It is not possible for MoA to bring
5 An account row is a set of accounts structuring a datum in a specific way. Multiple account rows
addressing the same datum allow different perspectives on this datum, e.g. source and disposition of
funds.
money with them into the accounting web. Hosts can enter the accounting web when enough new hosts
are available for a new group (in our specification: n hosts). They are also not allowed to bring money
with them and receive their accounts from the clearing infrastructure. Both MoA and hosts are able to
leave the web. Since money cannot re-enter the accounting web, they need to be cleared by transferring
all money to other hosts/agents staying inside the web. Otherwise the money is lost.</p>
        <p>Transactions within the accounting web: Within the accounting web, each financial transaction,
i.e., transfers of coins from one MoA to another or MoA migration, generates entries to the accounts.
We describe transactions by accounting functions ef , f = 1,…,h , h " N. An accounting function ef links
specific debit and credit accounts and a set of coin IDs to a value. For all ef applies:
(3) ef : T D ! T C ! ID " V , where TD gives all accounts being debited, TC gives all accounts
being credited, ID is the set of all coins (coin id) and V is the set of all values composable of
the elements of ID.
•
•
•
•
•
•
•
Thus, within a specific group of hosts three archetypes of transactions can be identified:
payments between two MoA located at the same host: ef ({! iMA } , {! MjA } , {idr }) = vijr ,
payments between MoA located at different hosts: ef ({! kH ,! iMA } , {! lH ,! MjA } , {idr }) = vkiljr
migrations of a MoA between hosts: ef ({! kH } ; {! lH } , {idr }) = vxyr
With more than one group, two additional archetypes can be identified:
migrations of MoA between groups of hosts: ef ({! Gp ,! kH } , {! qG ,! lH } , {idr }) = vpkqlr
payments between MoA located in different groups of hosts:
ef ({! Gp ,! kH ,! iMA } , {! qG ,! lH ,! MjA } , {idr }) = vpkiqljr</p>
        <p>Considering the clearing infrastructure, another two archetypes of financial transactions can be
identified:
withdrawal of digital coins: ef ({! I } , {! qG ,! lH ,! MjA } , {idr }) = vIqljr and
deposit of digital coins: ef ({! Gp ,! kH ,! iMA } , {! I } , {idr }) = vpkiIr</p>
        <p>Each accounting function is related to entries in at least two accounts. These entries include the
receiving/spending account, the value v that is being transferred, the IDs of the coins used for the
transfer, a time stamp, the host recorded the entry and a description of the service/resource paid/sold.</p>
        <p>Characteristics: The accounting web described above allows controlling the integrity of the
system as it allocates digital coins to MoA. The allocation is realized by recording transfer of
ownership to MoA, hosts and group accounts. The presented accounting based allocation concept
addresses all five requirements shown in Section 3.1. Fraud allocations can be detected in two ways: by
ex post examination of the payments a MoA has made and by checking the account balance.</p>
        <p>
          The ex-post examination of MoA payments is still comparable to conventional logging. Each
principal is able to check the income and the payments of its MoA either after the task fulfillment or
after a specific time period. He can thus identify payments that do not correspond to the agent’s task or,
when for instance cryptographic tracing according to [
          <xref ref-type="bibr" rid="ref54">58</xref>
          ] is enabled, those that do not match the
agent’s execution states. Unlike normal logging, each log entry exists both in the agent’s account and
the other accounts charged. Therefore the MoA is traceable within the accounting web as long as it
possesses at least one digital coin. Also, when fixing this coin to the MoA, no host is able to delete the
MoA. The accounting trace would end at this host, identifying it as malicious.
        </p>
        <p>With the account balance, we describe the validity of equation (1) for all groups r of hosts and the
equation (2) for the whole accounting web at any time of a PSMA lifecycle. The validity of equation
(1) is checked by a group r of n hosts each time a MoA enters or leaves the hosts that belong to group
r. Each host has to cast the MoA accounts located on it and publish the balance for the other group
members. All hosts within the group are able to check if the overall balance is equal to the balance of
the group account ! Gp. If</p>
        <p>m
! Gp " # ! iMA</p>
        <p>i=1
an error or fraud is detected and further steps have to be taken, e.g., the check of equation (2) and
the concrete analysis of the group’s activities.</p>
        <p>As long as (1) and (2) are true, the amount of money withdrawn (and not yet deposited) is equal to
the amount of money circulating within the accounting web. It is not possible to double spent digital
coins, since with the (second) entry this balance is lost and the double-spending is detected by the next
balance check. Also, when coins are stolen, e.g., by a malicious host executing a MoA, the stolen
money is worthless, as its reintegration into the accounting web would either lead to a discrepancy or,
when kept outside the accounting web, cannot be deposited back in the clearing infrastructure. No
payee will accept it.</p>
      </sec>
      <sec id="sec-5-3">
        <title>4.3 A simple example</title>
        <p>The simple example of an accounting web supported PSMA addresses the prevention of double
spending coins by detecting account unbalances. Thus, we make no use of the option to compare coin
IDs as they are stored within the agents’, hosts’ and groups’ accounts. Also, we abstain from an explicit
integration of the clearing infrastructure, i.e., the amount of circulating money is constant.</p>
        <p>The accounting web consists of two groups with n=2 hosts. At each host, one MoA is located.
Each MoA carries two digital coins already recorded in the agents’, the hosts’ and the groups’
accounts. One coin is fixed to the agent, i.e., the agent is not allowed to spend the coin. According to
this structure illustrated in figure 2, we have the following accounts:
•
•
•
•
! I , where ! I is constant and ! I = 8 ,
! 1G ,! 2G , where ! 1G = ! 2G = 4 ,
! 1H ,! 2H ,! 3H ,! 4H , where ! 1H = ! 2H = ! 3H = ! 4H = 2
! 1MA ,! 2MA ,! 3MA ,! 4MA , where ! 1MA = ! 2MA = ! 3MA = ! 4MA = 2
transaction
" ! iMA = 5 , i = 1,1*,2 .</p>
        <p>e1 (! 1H ;! 2H ; id (coin1* )) = 1
e2 (! 1H ;! 2H ; id (coin1, coin2 )) = 2</p>
        <p>Assume that host1 is malicious and generates coin1* by copying coin1 of agent1. When host1 is the
only malicious or corrupt actor (hosts and MoA) within the web and only MoA are allowed to use
money, host1 is able to spend coin1* in two ways only: (1) to generate agent1* that migrates (away from
host1) and spends coin1* ; (2) to disguise itself as agent1 and spend coin1* to e.g. agent4 .
Generating an agent1’: With the migration of agent1* from host1 to, e.g., host2, the transaction
is recorded within ! 1H and ! 2H . Assume now that agent1 has to migrate too, e.g. to host2, the
would lead to an unbalance within group1, as ! 1G = 4 (nothing has entered or left the group) and
e3(! 1G ,! 1H ,! 1MA ; ! 2G ,! 4H ,! 4MA ; id(coin1*)) = 1 .</p>
        <p>Masquerating as agent1 : Using this second option, host1 would initiate a transaction
e4 (! 1H ; ! 2H ; id(coin1,coin2)) = 2
Also, when agent1 migrates to, e.g., host2 and thus a transaction
is needed, an unbalance occurs within group1, as ! 1G
= 3 (e3 was recorded to ! 1G )
and " ! iMA = 4 .</p>
        <p>For the detection of double spending, a transfer of both coin1 and coin1* is needed. One option to
achieve this is by imposing time restrictions on MoA stopovers on hosts or group internal agent
rotation directives. There are also additional options for malicious hosts when more than one corrupt
actor exists, but at least they all will be detected when reintegrating double spent money into the
accounting web (at least when depositing the false coins).</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5 Summary and Future Work</title>
      <p>In this paper we addressed the design of a PSMA. We identified requirements on PSMA and discussed
the suitability of existing technical concepts for an implementation of a coin-MoA allocation system.
We presented an account-based solution giving a rough concept of a distributed and decentralized
accounting web. The web is managed by all hosts executing MoA. Malicious behavior of one host is
controlled by the hosts’ community. The accounting web is designed to be open for MoA and hosts,
but closed for (electronic) money.</p>
      <p>As a result, continuous allocation of (digital) coins and MoA can be achieved. The accounting web
also prevents double-spending and theft of coins as it allows an ex-post detection of cheating hosts.
The detection is possible both for MoA principals after the agents have fulfilled their task as well as for
other hosts according to an unbalance arising when, e.g., double-spent coins are used. Even MoA
brainwashing (according to financial transactions) by malicious hosts may possibly be preventable by
combining our concept with cryptographic trace methods.</p>
      <p>Our research on accounting based allocation systems and PSMA is still in progress. Therefore
some aspects/questions related to the application of accounting webs for MoA-coin allocation are not
discussed within this paper. These include:
• The need for digital coins when the accounting web is finalized: is it possible to expand the
allocation subsystem to a full PSMA without coins?
• The systems’ behavior when hosts or groups of hosts crash: is the money also lost when a host
disconnects due to a malfunction? What happens with the group if one host disappears?
• Malicious groups of hosts: how can we avoid groups consisting of only malicious hosts? And
what happens if a malicious host is detected?
• The economic transaction recorded by the accounting web: actually only financial transactions
are recorded. Are there any advantages when, e.g., the service executions are also journalized?
As next steps in the implementation of an account-based allocation system we will address
concrete realization of both (1) accounts and (2) protocols for hosts and MoA interaction. While the
first step has to take cryptographic methods and the data of the recorded entries into account, the
second has to include specifications for hosts’ and MoA entrance and exit of the accounting web,
protocols ensuring consistent entries to accounts as well as for checking the accounting balance and
rules about the consequences of detected unbalance.</p>
      <p>In our future research, we will use the axiomatic-based accounting theory as a method to address
these aspects and to advance the given rough concept to a more detailed one. For a final evaluation we
plan to use a game theoretic analysis of the principals’ behaviors affected by our concept.</p>
    </sec>
    <sec id="sec-7">
      <title>6 References</title>
      <p>[1] Abrazhevich, D.: Classification and Characteristics of Electronic Payment Systems. In
Proceedings of the 2nd International Conference on Electronic Commerce and Web Technologies
(EC-Web’01). Springer, Heidelberg, LNCS 2115, 2001, 81-90.
[2] Algesheimer, J.; Cachin, C.; Camenisch, J.; Karjoth, G.: Cryptographic Security for Mobile Code.</p>
      <p>In Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&amp;P’01). IEEE Computer
Society, 2001, 2-11.
[3] Al-Jaljouli, R.: Boosting m-Business Using a Truly Secured Protocol for Data Gathering Mobile</p>
      <p>Agents. In Proceedings of the International Conference on Mobile Business (ICMoA’05). 2005.
[4] Athanassios, B.: Programming Sensor Networks with Mobile Agents. In Chrysanthis, P.; Samaras,
G. (eds.): Proceedings of the 6th International Conference on Mobile data management. ACM
Press, New York, 2005, 252-256.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Bamaska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ; Zhang, N.:
          <article-title>A Secure Method for Signature Delegation to Mobile Agents</article-title>
          .
          <source>In Proceedings of the 2004 ACM symposium on Applied computing (ACM SAC'04)</source>
          . ACM Press,
          <year>2004</year>
          ,
          <fpage>813</fpage>
          -
          <lpage>818</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Biehl</surname>
          </string-name>
          , I.; Meyer, B.;
          <string-name>
            <surname>Wetzel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Ensuring the Integrity of Agent-Based Computations by Short Proofs</article-title>
          . In: Rothermel,
          <string-name>
            <given-names>K.</given-names>
            ;
            <surname>Hohl</surname>
          </string-name>
          ,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (Eds.): Mobile Agents. Springer, Heidelberg, LNCS 1477,
          <year>1998</year>
          ,
          <fpage>183</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Bierman</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Cloete</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Classification of Malicious Host Threats in Mobile Agent Computing</article-title>
          .
          <source>In Proceedings of the 2002</source>
          annual
          <article-title>research conference of the South African institute of computer scientists and information technologists on Enablement through technology (SAICSIT'02)</article-title>
          . ACM International Conference Proceeding Series,
          <volume>30</volume>
          ,
          <year>2002</year>
          ,
          <fpage>141</fpage>
          -
          <lpage>148</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Borselius</surname>
            , N.; Mitchell,
            <given-names>C.</given-names>
          </string-name>
          ; Wilson,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>On Mobile Agent Based Transactions in Moderatly Hostile Environments</article-title>
          .
          <source>In Proceedings of the 1st International IFIP Working Conference on Network Security (IFIP I-NetSec'01)</source>
          . Kluwer Academic Publisher,
          <year>2001</year>
          ,
          <fpage>173</fpage>
          -
          <lpage>186</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Borchert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Geld und Kredit. 7th edition</article-title>
          , Oldenburg Verlag, Wien,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Cachin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Camenisch</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kilian</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Müller</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <string-name>
            <surname>One-Round Secure</surname>
          </string-name>
          Computation and Secure Autonomous Mobile Agents.
          <source>In Proceedings of the 27th International Colloquium of Automata, Languages and Programming (ICALP'00)</source>
          . Springer, LNCS
          <year>1853</year>
          , Berlin,
          <year>2000</year>
          ,
          <fpage>512</fpage>
          -
          <lpage>523</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Chess</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Harrison</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kershenbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mobile Agents: Are They a Good Idea</article-title>
          ? In: Vitek,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (Eds.):
          <source>Mobile Object Systems - Towards the Programmable Internet. Lecture Notes in Computer Science, No. 1222</source>
          , Springer,
          <year>1997</year>
          ,
          <fpage>25</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Claessens</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Analysis and design of an advanced Infrastructure for Secure and Anonymous Electronic Payment Systems on the Internet</article-title>
          .
          <source>Ph.D. Thesis</source>
          , Katholieke Universiteit Leuven,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Claessens</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Preneel</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Vandewalle</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions</article-title>
          .
          <source>ACM Transactions on Internet Technologie</source>
          ,
          <volume>3</volume>
          ,
          <issue>1</issue>
          (
          <year>2003</year>
          ),
          <fpage>28</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Dadon-Elichai</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>RDS: Remote Distributed Scheme for Protecting Mobile Agents</article-title>
          .
          <source>In Proceedings of the 3rd International Joint Conference on Autonomous Agents &amp; Multi Agent Systems (AAMAS'04)</source>
          . Downloaded from http://www.aamas2004.org, June 20th,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Payment Agents</article-title>
          . In: Kou,
          <string-name>
            <surname>W</surname>
          </string-name>
          . (Eds.): Payment Technologies for E-Commerce. Springer, Berlin,
          <year>2003</year>
          ,
          <fpage>149</fpage>
          -
          <lpage>170</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Endsuleit</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Mie,
          <string-name>
            <surname>T.</surname>
          </string-name>
          :
          <article-title>Secure Multi-Agent Computations</article-title>
          .
          <source>In Proceedings of International Conference on Security and Management (Sam'03)</source>
          .
          <year>2003</year>
          ,
          <fpage>149</fpage>
          -
          <lpage>155</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>[17] European Central Bank: Report on Electronic Money</source>
          <year>1998</year>
          . Downloaded from https://www.ecb.int/pub/pdf/other/emoneyen.pdf,
          <year>February 8th</year>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Farmer</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ; Guttmann,
          <string-name>
            <given-names>J.</given-names>
            ;
            <surname>Swarup</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          :
          <article-title>Security for Mobile Agents: Authentication and state appraisal</article-title>
          .
          <source>In Proceedings of the 4th European Symposium on Research in Computer Security (ESORICS'96)</source>
          . Springer, LNCS
          <volume>1146</volume>
          , Berlin,
          <year>1996</year>
          ,
          <fpage>118</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Falchuk</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Karmouch</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>The Mobile Agent Paradigm Meets Digital Document Technology: Designing for Autonomous Media Collection</article-title>
          .
          <source>In Multimedia Tools and Application</source>
          . Springer, Volume
          <volume>8</volume>
          ,
          <issue>1</issue>
          ,
          <year>1999</year>
          ,
          <fpage>137</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [20]Ferreira, de Carvalho L.;
          <string-name>
            <surname>Dahab</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Blinded-Key Signatures: securing private keys in mobile agents</article-title>
          .
          <source>In Proceedings of the 2002 ACM symposium on Applied computing (ACM SAC'02)</source>
          . ACM Press,
          <year>2002</year>
          ,
          <fpage>82</fpage>
          -
          <lpage>86</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Foukia</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <article-title>Idream: Intrusion detection and response executed with agent mobility - the conceptual model based on self-organizing natural systems</article-title>
          .
          <source>In Proceedings of the Engineering SelfOrganising Applications Workshop (ESOA'04)</source>
          . AAMoAS conference,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Fuggetta</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Picco</surname>
            ,
            <given-names>G. P.</given-names>
          </string-name>
          ; Vigna,
          <string-name>
            <surname>G.</surname>
          </string-name>
          :
          <article-title>Understanding Code Mobility</article-title>
          .
          <source>IEEE Transactions on Software Engineering</source>
          ,
          <volume>24</volume>
          ,
          <issue>5</issue>
          (
          <year>1998</year>
          ),
          <fpage>342</fpage>
          -
          <lpage>361</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Gunupudi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Tate</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <article-title>: Performance Evaluation of Data Integrity Mechanism for Mobile Agents</article-title>
          .
          <source>In Proceedings of 2004 IEEE Conference on Information technology: Coding and Computing (ITCC'04)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>2004</year>
          ,
          <fpage>62</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Hacini</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Using Dynamic Adaptability to Protect Mobile Agents Code</article-title>
          .
          <source>In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>2005</year>
          ,
          <fpage>49</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Henkel</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Anforderungen an Zahlungsverfahren im E-Commerce</article-title>
          . In: Teichmann,
          <string-name>
            <surname>R.</surname>
          </string-name>
          ; Nonnenmacher,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Henkel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J</given-names>
            . (Eds.):
            <surname>E-Commerce und</surname>
          </string-name>
          E-Payment. Gabler, Wiesbaden,
          <year>2001</year>
          ,
          <fpage>103</fpage>
          -
          <lpage>121</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Hohl</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A Model of Attacks of Malicious Hosts Against Mobile Agents</article-title>
          .
          <source>In: Proceedings of the 4th ECOOP Workshop on Mobile Object Systems (MOS'98)</source>
          . Springer, LNCS
          <volume>1543</volume>
          , Berlin,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Hohl</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A Protocol to Detect Malicious Host Attacks by Using Reference States</article-title>
          .
          <source>Report Nr</source>
          .
          <volume>09</volume>
          /99, Downloaded from ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/TR1999-09/TR-1999-09.pdf,
          <year>October 10th</year>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Hohl</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Sicherheit in Mobile-Agenten-Systemen</article-title>
          .
          <source>Ph.D. Thesis</source>
          , Universität Stuttgart,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Horlait</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Magedanz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Glitho</surname>
            ,
            <given-names>R.H</given-names>
          </string-name>
          . (Eds.):
          <article-title>Mobile Agents for Telecommunication Applications</article-title>
          . 5th International Workshop (MoATA
          <year>2003</year>
          ). Springer, Berlin, LNCS 2881,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Jansen</surname>
            ,
            <given-names>W.A.</given-names>
          </string-name>
          :
          <article-title>Countermeasures for Mobile Agent Security</article-title>
          . In Computer Communications.
          <article-title>Special issue on advanced security techniques for network protection</article-title>
          .
          <volume>23</volume>
          (
          <issue>17</issue>
          ), Elsevier Science,
          <year>2000</year>
          ,
          <fpage>1667</fpage>
          -
          <lpage>1676</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Jarchow</surname>
          </string-name>
          , H.-J.:
          <source>Theorie und Politik des Geldes. 11th edition</source>
          , Vandenhoeck &amp; Ruprecht, Göttingen,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Karmouch</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Magedanz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Delgado</surname>
            ,
            <given-names>J</given-names>
          </string-name>
          . (Eds.):
          <article-title>Mobile Agents for Telecommunication Applications</article-title>
          . 4th International Workshop (MoATA
          <year>2002</year>
          ). Springer, Berlin, LNCS 2521,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Kotzanikolaou</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Burmester</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Chrissikopoulos</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Secure Transactions with Mobile Agents in Hostile Environments</article-title>
          .
          <source>In Proceedings of the Australasian Conference on Information Security and Privacy (ACISP'00)</source>
          . Springer, LNCS
          <year>1841</year>
          , Berlin,
          <year>2000</year>
          ,
          <fpage>289</fpage>
          -
          <lpage>297</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Krügel</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Toth</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Applying Mobile Agent technology to Intrusion Detection. Arbeitsbericht Nr</article-title>
          . TUV-1841
          <string-name>
            <surname>-</surname>
          </string-name>
          2002-31. Downloaded from http://www.infosys. tuwien.ac.at/reports/bin/abstract.
          <source>pl?report=TUV-1841-2002-31 , March</source>
          , 8th
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Kaneda</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Tanka</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Enkokido</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Takizawa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Transactional Agent Model for FaultTolerant Object Systems</article-title>
          .
          <source>In Proceedings of the 2005 ACM symposium on Applied computing</source>
          . ACM Press, New York,
          <fpage>1133</fpage>
          -
          <lpage>1138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Alves-Foss</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ; Harrison,
          <string-name>
            <surname>S.:</surname>
          </string-name>
          <article-title>The use of encrypted Functions for Mobile Agent Security</article-title>
          .
          <source>In Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>2004</year>
          ,
          <year>390297b</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [37]
          <string-name>
            <surname>Loureiro</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; Molva,
          <string-name>
            <surname>R.</surname>
          </string-name>
          :
          <article-title>Function Hiding Based on Error Correcting Codes</article-title>
          .
          <source>In Proceedings of the International Workshop on Cryptographic Techniques and Electronic Commerce (CryptTEC'99)</source>
          .
          <year>1999</year>
          ,
          <fpage>92</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [38]
          <string-name>
            <surname>Ma</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Tsai</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ; Murata,
          <string-name>
            <surname>T.</surname>
          </string-name>
          :
          <article-title>A Secure Mobile Agent System Model Based on Extended Elementary Object System</article-title>
          .
          <source>In Proceedings of the 28th Annual International Computer Software and Applications Conference (COMPSAC'04)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>2004</year>
          ,
          <fpage>218</fpage>
          -
          <lpage>223</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [39]
          <string-name>
            <surname>Milojicic</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Trend Wars:
          <article-title>Mobile Agent Applications</article-title>
          . IEEE Concurrency,
          <volume>6</volume>
          ,
          <year>1999</year>
          ,
          <fpage>80</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [40]
          <string-name>
            <surname>Minsky</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Renesse</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Schneider</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Stoller</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Cryptographic Support for Fault-Tolerant Distributed Computing</article-title>
          .
          <source>In Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications</source>
          . ACM Press,
          <year>1996</year>
          ,
          <fpage>109</fpage>
          -
          <lpage>114</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [41]
          <string-name>
            <surname>Olougouna</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Pierre</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; Glitho,
          <string-name>
            <surname>R.:</surname>
          </string-name>
          <article-title>An Extensible Mobile-Agent-Based Framework for Coordinating Distributed Information Retrival Applications</article-title>
          . In: Karmouch,
          <string-name>
            <given-names>A.</given-names>
            ;
            <surname>Magedanz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ;
            <surname>Delgado</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (Eds.):
          <source>Mobile Agents in Telecommunication 2002</source>
          , Springer, Berlin, LNCS 2521,
          <year>2002</year>
          ,
          <fpage>281</fpage>
          -
          <lpage>291</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [42]
          <string-name>
            <surname>Page</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Zaslavsky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Indrawan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Countering Security Vulnerabilities in Agent Execution using a Self Executing Security Examination</article-title>
          .
          <source>In Proceedings of the 3rd International Joint Conference of Autonomous Agents &amp; Multi Agent Systems (AAMAS'04)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>2004</year>
          ,
          <fpage>1486</fpage>
          -
          <lpage>1487</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [43]
          <string-name>
            <surname>Pierre</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glitho</surname>
            ,
            <given-names>R</given-names>
          </string-name>
          . (Eds.):
          <article-title>Mobile Agents for Telecommunication Applications</article-title>
          . Third International Workshop (MoATA
          <year>2001</year>
          ). Springer, Berlin, LNCS 2164,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [44]
          <string-name>
            <surname>Radu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Analysis and design of Off-line Electronic Payment Systems</article-title>
          . Dissertation, Katholieke Universiteit Leuven,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [45]
          <string-name>
            <surname>Riordan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Schneier</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Environmental Key Generation towards Clueless Agents</article-title>
          . In Vigna, G. (Ed.):
          <source>Mobile Agents and Security</source>
          . Springer, LNCS
          <volume>1419</volume>
          , Berlin,
          <year>1998</year>
          ,
          <fpage>15</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [46]
          <string-name>
            <surname>Rivest</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Shamir</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>PayWord and MicroMint: Two simple micropayment schemes</article-title>
          .
          <source>In Proceedings of 1996 International Workshop on Security Protocols</source>
          . Springer, LNCS
          <volume>1189</volume>
          , Berlin,
          <year>1997</year>
          ,
          <fpage>69</fpage>
          -
          <lpage>87</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [47]
          <string-name>
            <surname>Romao</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Silva</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Secure Mobile Agent Digital Signatures with Proxy Certificates</article-title>
          . In: Ye,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          ; Liu,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (Eds.): E-Commerce Agents. Springer, Heidelberg,
          <year>2001</year>
          ,
          <fpage>206</fpage>
          -
          <lpage>220</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [48]
          <string-name>
            <surname>Sander</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Tschudin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Towards Mobile Cryptography</article-title>
          .
          <source>In Proceedings of the 1998 IEEE Symposium on Security and Privacy (S&amp;P'01)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>1998</year>
          ,
          <fpage>215</fpage>
          -
          <lpage>224</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [49]
          <string-name>
            <surname>Sander</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Young</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Yung</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Non-interactive CryptoComputing for NC</article-title>
          .
          <source>In: 40th Annual Symposium on Foundations of Computer Science (FOCS'99)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>1999</year>
          ,
          <fpage>554</fpage>
          -
          <lpage>567</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [50]
          <string-name>
            <surname>Schaal</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <source>Geldtheorie und Geldpolitik. 4th edition</source>
          , Oldenburg Verlag, Wien,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [51]
          <string-name>
            <surname>Shamir</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>How to share a secret</article-title>
          .
          <source>Communications of the ACM</source>
          ,
          <volume>24</volume>
          ,
          <issue>11</issue>
          (
          <year>1979</year>
          ),
          <fpage>612</fpage>
          -
          <lpage>613</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [52]
          <string-name>
            <surname>Shi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Cao</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>A Security Scheme of Electronic Commerce for Mobile Agents Uses Undetachable Digital Signatures</article-title>
          .
          <source>In Proceedings of the 3rd International Conference on Information Security</source>
          . ACM Press,
          <year>2004</year>
          ,
          <fpage>242</fpage>
          -
          <lpage>243</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [53]
          <string-name>
            <surname>Songsiri</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A New Approach for Computation Result Protection in the Mobile Agent Paradigm</article-title>
          .
          <source>In Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC'05)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>2005</year>
          ,
          <fpage>575</fpage>
          -
          <lpage>581</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [54]
          <string-name>
            <surname>Tan</surname>
            ,
            <given-names>H.K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Moreau</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Certificates for Mobile Code Security</article-title>
          .
          <source>In Proceedings of the 17th ACM Symposium on Applied Computing (ACM SAC'02)</source>
          . ACM Press,
          <year>2002</year>
          ,
          <fpage>76</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [55]
          <string-name>
            <surname>Tate</surname>
            ,
            <given-names>S.R.</given-names>
          </string-name>
          ; Xu,
          <string-name>
            <surname>K.</surname>
          </string-name>
          :
          <article-title>Mobile Agent Security through Multi-Agent Cryptographic Protocols</article-title>
          .
          <source>In 4th International Conference on Internet Computing (IC'03)</source>
          . CSREA Press,
          <year>2003</year>
          ,
          <fpage>462</fpage>
          -
          <lpage>468</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [56]
          <string-name>
            <surname>Thai</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ; Chamg,
          <string-name>
            <surname>P.</surname>
          </string-name>
          ; Agha,
          <string-name>
            <surname>G.</surname>
          </string-name>
          :
          <article-title>Crawlets: Agents for High Performance Web Searche Engines</article-title>
          . In: Picco,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (Ed.): Mobile Agents. Springer, Berlin, LNCS 2240,
          <year>2001</year>
          ,
          <fpage>119</fpage>
          -
          <lpage>2001</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [57]
          <string-name>
            <surname>Velazquez</surname>
            ,
            <given-names>E</given-names>
          </string-name>
          ; Santoro,
          <string-name>
            <given-names>N.</given-names>
            ;
            <surname>Nayak</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>A Mobile Agent Prototype for Distributed Search</article-title>
          . In: Pierre,
          <string-name>
            <surname>S.</surname>
          </string-name>
          ; Glitho,
          <string-name>
            <surname>R</surname>
          </string-name>
          .(Eds.):
          <source>Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications</source>
          . Springer, Berlin, LNCS 2164,
          <year>2001</year>
          ,
          <fpage>245</fpage>
          -
          <lpage>254</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [58]
          <string-name>
            <surname>Vigna</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Cryptographic Traces for Mobile Agents</article-title>
          . In: Vigna,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (Eds.): Mobile Agent Security. Springer, Heidelberg, LNCS 1419,
          <year>1998</year>
          ,
          <fpage>137</fpage>
          -
          <lpage>153</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [59]
          <string-name>
            <surname>Vigna</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Mobile Agents: Ten Reasons For Failure</article-title>
          .
          <source>In Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM'04)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>2004</year>
          ,
          <fpage>298</fpage>
          -
          <lpage>299</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [60]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Huang,
          <string-name>
            <given-names>H.</given-names>
            ;
            <surname>Wang</surname>
          </string-name>
          , H.:
          <string-name>
            <surname>Multi-Mobile</surname>
            <given-names>Agents</given-names>
          </string-name>
          '
          <article-title>Seperation Scheme in Java Card Application for Mobile Agent's Security</article-title>
          .
          <source>In Proceedings of the 2004 IEEE International Conference on Service Computing (SCC'04)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>2004</year>
          ,
          <fpage>623</fpage>
          -
          <lpage>628</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [61]
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mobile Agent - Based Module Distribution in Heterogenous Networks</article-title>
          . In: Stamatis,
          <string-name>
            <surname>V.</surname>
          </string-name>
          et al:
          <source>Proceedings of the first conference on Computing Frontiers</source>
          . ACM Press,
          <fpage>288</fpage>
          -
          <lpage>293</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [62]
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Zahlungsverfahren im Internet - Zahlungen mittels Kreditkarte, Lastschrift und Geldkarte</article-title>
          .
          <source>Verlag Dr. Otto Schmidt</source>
          , Köln,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [63]
          <string-name>
            <surname>Wilhelm</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Staatmann</surname>
            ,
            <given-names>S</given-names>
          </string-name>
          ; Buttyan,
          <string-name>
            <surname>L.</surname>
          </string-name>
          :
          <article-title>Introducing Trusted Third Parties to the Mobile Agent Paradigm</article-title>
          . In: Vitek,
          <string-name>
            <surname>J.</surname>
          </string-name>
          ; Jensen,
          <string-name>
            <surname>C</surname>
          </string-name>
          . (Eds.):
          <article-title>Secure Internet Programming: Security Issues for Mobile and Distributed Objects</article-title>
          . Springer, LNCS
          <volume>1603</volume>
          , New York,
          <year>1999</year>
          ,
          <fpage>469</fpage>
          -
          <lpage>489</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          [64]
          <string-name>
            <surname>Yee</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A Sanctuary for Mobile Agents</article-title>
          . In: Vitek,
          <string-name>
            <surname>J.</surname>
          </string-name>
          ; Jensen,
          <string-name>
            <surname>C</surname>
          </string-name>
          . (Eds.):
          <article-title>Secure Internet Programming: Security Issus for Mobile and Distributed Objects</article-title>
          . Springer, LNCS
          <volume>1603</volume>
          , New York,
          <year>1999</year>
          ,
          <fpage>261</fpage>
          -
          <lpage>274</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          [65]
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Z</given-names>
          </string-name>
          .; Cheng,
          <string-name>
            <given-names>Z.</given-names>
            ;
            <surname>Mao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ;
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          :
          <article-title>PICC: A Secure Mobile Agent Framework Based on Garbled Circuit</article-title>
          .
          <source>In Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05)</source>
          .
          <source>IEEE Computer Society</source>
          ,
          <year>2005</year>
          ,
          <fpage>357</fpage>
          -
          <lpage>362</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          [66]
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Rana</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Georgousopoulos</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Walker</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Mobile Agents and the SARA Digital Library</article-title>
          . In: Papazoglou,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Sheth</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <source>Seventh IEEE Advances in Digital Libraries 2000 (ADL '00)</source>
          .
          <year>2000</year>
          ,
          <fpage>71</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          [67]
          <string-name>
            <surname>Zhicai</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Zhenzhou</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ; Mingzeng, H.:
          <article-title>A Novel Distributed Intrusion Detection Model Based on Mobile Agent</article-title>
          . In: White,
          <string-name>
            <surname>J.</surname>
          </string-name>
          ; Sheng,
          <string-name>
            <surname>H.</surname>
          </string-name>
          :
          <article-title>Proceedings of the 3rd international conference on Information security</article-title>
          . ACM Press, New York,
          <year>2004</year>
          ,
          <fpage>155</fpage>
          -
          <lpage>159</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          [68]
          <string-name>
            <surname>Zhong</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>Y.R.</given-names>
          </string-name>
          :
          <article-title>Verifiable Distributed Oblivious Transfer and Mobile Agent Security</article-title>
          .
          <source>In Proceedings of the 2003 Joint Workshop on Foundations of Mobile Computing (DIALMPOMC'03)</source>
          , ACM Press, New York,
          <year>2003</year>
          ,
          <fpage>12</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>