<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Towards Payment Systems for Mobile Agents</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Christian</forename><surname>Anhalt</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Universität Hohenheim</orgName>
								<address>
									<postCode>70593</postCode>
									<settlement>Stuttgart</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Stefan</forename><surname>Kirn</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Universität Hohenheim</orgName>
								<address>
									<postCode>70593</postCode>
									<settlement>Stuttgart</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Towards Payment Systems for Mobile Agents</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4769A0A9F2820338C52690642BE65C4C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T14:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Future areas of application for mobile agents technology are open, distributed and decentralized networks, where Mobile Agents autonomously perform tasks on behalf of their principals . In this paper, we address the conceptual design of payments for and between Mobile Agents, particularly against the background of the Malicious Host Problem. We analyze the requirements on payment systems for Mobile Agents and give a survey on existing technical solutions partially matching these requirements. We then discuss a new concept that does not require Mobile Agents to hold secrets and that allows allocations of digital coins and agents even in an environment that contains Malicious Hosts. The concept is based on the principles of accounting systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Mobile Agents (MoA) are software entities able to migrate autonomously from one host to another (cf. <ref type="bibr" target="#b21">[22]</ref>). Within the last decade, the paradigm of MoA was discussed broadly and also controversially (cf. <ref type="bibr" target="#b38">[39]</ref>, <ref type="bibr" target="#b10">[11]</ref>). Many suggestions for future fields of application of MoA have been made. <ref type="bibr" target="#b18">[19]</ref> and <ref type="bibr" target="#b67">[66]</ref> proposed the application of MoA in distributed databases and digital libraries. <ref type="bibr" target="#b33">[34]</ref>, <ref type="bibr" target="#b20">[21]</ref> and <ref type="bibr" target="#b68">[67]</ref> investigated their applicability for intrusion detection; <ref type="bibr" target="#b28">[29]</ref>, <ref type="bibr" target="#b31">[32]</ref>, <ref type="bibr" target="#b42">[43]</ref> addressed telecommunication networks, while <ref type="bibr" target="#b3">[4]</ref> focused on large sensor networks; <ref type="bibr" target="#b34">[35]</ref> and <ref type="bibr" target="#b61">[61]</ref> proposed software updates and <ref type="bibr" target="#b55">[56]</ref>, <ref type="bibr" target="#b56">[57]</ref> and <ref type="bibr" target="#b40">[41]</ref> information retrieval as fields of appli-cation. MoA perform their tasks in open, distributed and decentralized networks. They are executed by hosts owned and operated by people different from the agents' owners. To accomplish their tasks, MoA migrate between hosts and access resources (e.g., computing power, but also services such as yellow book services) provided by hosts as well as other (mobile) agents. Since hosts and MoA are owned by different persons, the need for coordination of (economic) interests between these principals <ref type="foot" target="#foot_0">1</ref> arises.</p><p>Setting up payment systems for Mobile Agents (PSMA) is one possible solution to meet these needs. When designing PSMA, the Malicious Host Problem (MHP) has to be taken into account. The MHP refers to the inability of MoA to use as well as hide information from hosts executing them (cf. Section 2). For (secure and tamper-proof) PSMA, this raises questions about their technical feasibility, since existing electronic payment systems are based on the usage of specific secrets, e.g., private keys.</p><p>In this paper, we deal with the design of (secure and tamper-proof) PSMA. According to requirements on PSMA not complied by other solutions we develop a PSMA subsystem for allocating <ref type="foot" target="#foot_1">2</ref>MoA and digital coins. Assuming that the MHP is not adequately solvable yet (cf. <ref type="bibr" target="#b59">[59]</ref>), we avoid using any secrets held by MoA and address PSMA allocation systems from the perspective of transparency and self-control. Our concept bases on an accounting web distributed among and managed by groups of hosts executing the MoA. It is designed as a decentralized and distributed open system and allows an ex post detection of double-spending and also thievery of coins.</p><p>The paper is structured as follows. In Section 2 we discuss PSMA taking into account the MHP. In Section 3 we analyze the requirements for a PSMA by deducing them from the goals of the principals <ref type="bibr">(3.1)</ref>. We give a survey on existing technical concepts possibly suitable for PSMA and discuss them in view of the requirements that have been identified <ref type="bibr">(3.2)</ref>. Section 4 describes our allocation concept. Starting with the assumptions we made in 4.1, we give a rough draft of our concept in 4.2. Section 4.3 gives a simple example of the double-spent detection mechanism. We discuss unsolved questions, next steps of our research and the evaluation of future results in Section 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Payment Systems for Mobile Agents and the Malicious Host Problem</head><p>A PSMA is a system enabling MoA to balance debt and credit. Debt and credit are generated when agents access resources provided by other agents or hosts, both owned by principals different from theirs. We assume that principals have economic interests, which they link to the agents or hosts administrated and owned by them. Thus, PSMA can be seen as systems supporting the (price/market based) coordination of (economic) interests of principals -MoA pay for access to resources using digital money provided by their principals. The resource-owning principals receive the money and are able to either deposit it in their bank accounts or to use it otherwise (cf. Figure <ref type="figure">1</ref>). Like any kind of money, the digital information MoA use for payment has to fulfil three functionalities: medium of exchange, storage of value, and measurement of value. (cf. <ref type="bibr">[9] [50]</ref>).</p><p>Conventional electronic payment systems generally can be grouped into two classes -token/cashbased or account/check-based electronic payment systems (cf. <ref type="bibr" target="#b0">[1]</ref>). Account/check-based systems use orders signed by the payer and sent to a central clearing institution in order to transfer the specified amount of money to the payee's account. Since a clearing institution is involved in each financial transaction, one of their characteristics are high minimum transaction costs (considering both the involvement of a third party and high security costs of the clearing server), compared with token/cashbased systems. Thus, they are unsuitable for nano-and micropayments, which will primarily take place in future PSMA. Token/cash-based payment systems incur lower transaction costs, especially when realized as multistage and offline systems (assuming that tampering can be prevented). Thus, they may be better suited for nano-and micropayments between MoA.</p><p>For our work, we focus on PSMA defined as systems consisting of token/cash-based electronic money (cf. <ref type="bibr" target="#b16">[17]</ref> for definition) that MoA can use for exchange, storage and measurement of value in open, distributed and decentralized networks.</p><p>The fact that MoA can be executed by hosts not owned by the same principals leads to the MHP. It refers to the ability of any agent-executing host to attack the MoA, for example by spying out or manipulating code, data or execution state (cp. <ref type="bibr" target="#b12">[13]</ref> [7] <ref type="bibr" target="#b29">[30]</ref>, see <ref type="bibr" target="#b25">[26]</ref> for a detailed analysis of the MHP). As a result, it is not possible for MoA to hide and, at the same time, use information without risking manipulation or copying of this information by the executing host <ref type="foot" target="#foot_2">3</ref> .</p><p>Conventional electronic payment systems use cryptographic methods for generating electronic money. They rely on secrets held by the payer, the payee and other involved actors. These secrets can either be private keys used for signature generation and authentication or digital coins (cp. <ref type="bibr" target="#b45">[46]</ref>). Therefore PSMA build on the basis of existing electronic payment technologies cannot address both the exchange functionality and the value storage functionality of money. Trying to implement both functionalities, situations would arise where malicious hosts can copy and/or steal money from MoA, even with significantly reduced chances for traceability. This is true for conventional payment system based PSMA as long as no general solution for the MHP exists. It is also independent from the type of payment system, since both check/account-based and token/cash-based payment systems rely on secrets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Adaptable technology concepts for PSMA</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Requirements on PSMA</head><p>Conventional electronic payment systems can be described by means of a generic (financial) transfer and role model (cf. <ref type="bibr" target="#b43">[44]</ref>). Within this model, all roles assignable to actors are identified and related to specific financial transfers, e.g., payment, withdrawal or deposit. In order to identify possible roles principals can take within a PSMA, we expanded the original model from <ref type="bibr" target="#b43">[44]</ref> to a (financial) transfer and role model describing PSMA (see figure <ref type="figure">1</ref>). Thus, we first modeled (financial) transactions generated by agents upon MoA roles and integrated them into the original model. Then we deduced additional principal roles involved in the payment circuit.</p><p>The names of agent roles have been selected to reflect their position within the payment circuit. Additionally, we defined a virtual currency area that represents an arbitrary set of (connected) MoA execution platforms. Agents' payments are restricted to this currency area.</p><p>According to the roles and their specific position in the financial circuit, we assigned superordinate goals to each principal's role. We then decomposed and consolidated these goals from a MoA oriented perspective, i.e., the principals' goals were transferred to the MoA as possible. As a result, we obtained high-level requirements on PSMA.</p><p>Figure <ref type="figure">1</ref>: Financial transfer and role model of a PSMA Among high-level requirements that are, e.g., related to the general functionality of MoA and platforms, we identified two groups of high-level requirements important for our work: requirements related to electronic money per se and requirements related to the allocation of electronic money to MoA.</p><p>The requirements related to electronic money are identical with those defined in literature for conventional electronic money: identification of counterfeit and double-spent money, non-linkability of payment and withdrawal, traceability of transactions for the payer and the payee, ex post integrity of payments, adequate transaction costs, etc. (cf. <ref type="bibr" target="#b24">[25]</ref>, <ref type="bibr" target="#b62">[62]</ref>). Important for our works are the requirements related to the second group, the (one-to-one) allocation of electronic money to MoA. In conventional electronic payment systems, similarly to real life, unambiguous allocation of coins is realized through the institute of ownership: someone owns coins and/or specific information and thus has the power of disposition over them. For MoA, exclusive possession is not possible. Thus, an allocation (sub-) system based on a different concept but providing equal functionality is needed (which is, of cause, the first high-level requirement).</p><p>The high-level requirements we identified on an allocation system providing one-to-one allocations are:</p><p>• consistency of allocations even by migrations of agents,</p><p>• verifiability of allocations, i.e., the ability to identify tampered allocations by MoA, hosts and principals, • interchangeability of allocations, i.e., the transfer of allocations from payers to payees, • robustness of allocations, e.g., their restorability in case of host or connection breakdown, • divisibility of allocations, unless the allocations are not related to an atomic finance unit. These requirements overlap with requirements for electronic money. For instance, while implementing all required allocation functionalities the requirement "identification of double-spent money" could also be met as long as verifiability of one-to-one allocations is granted.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Research related to PSMA</head><p>A final and complete technical solution for the MHP would enable MoA to hide and use secrets. In this case, conventional electronic payment technology could be used for PSMA. Thus, a literature review has to consider both explicit work on payment technologies for MoA and implicit work addressing the MHP directly.</p><p>The implicit research on PSMA can be divided into six groups: research on Mobile Cryptography, Code Obfuscation, Environmental Key Generation, Internal Hardware Extensions, Reference States and Signature Delegation techniques for MoA. Explicit research is based upon distributed threshold schemes (which are also used by some implicit solutions).</p><p>The conceptual idea of Mobile Cryptography is to encipher the code and all data of a MoA in a way so that the agent is still executable in its encoded form. Ideally, the encoded MoA is still able to handle inputs and outputs without loosing its cryptographic protection. <ref type="bibr" target="#b47">[48]</ref> originally addressed this idea, ongoing work has been done by <ref type="bibr" target="#b48">[49]</ref>, <ref type="bibr" target="#b36">[37]</ref>, <ref type="bibr" target="#b9">[10]</ref>, <ref type="bibr" target="#b35">[36]</ref> and <ref type="bibr" target="#b66">[65]</ref>. Whereas these approaches focus only on one host participating in the agents' execution, <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b69">[68]</ref>, <ref type="bibr" target="#b54">[55]</ref> and <ref type="bibr" target="#b15">[16]</ref> addressed the integration of additional (semi-trusted) hosts. Within Mobile Cryptography approaches, an allocation subsystem for PSMA may be build upon the MoA ability to keep secrets. However, there are no prototype implementations known. Additional research is still needed to protect MoA on a higher level (cf. <ref type="bibr" target="#b66">[65]</ref>). Also, characteristic of all Mobile Cryptography approaches are very high requirements for additional computation power, bandwidth and complexity handling compared to "non-encoded" MoA. Even when these concepts are implemented, high transaction costs will result when using them for PSMA.</p><p>Research on Code Obfuscation for MoA has been done by <ref type="bibr" target="#b26">[27]</ref>, <ref type="bibr" target="#b27">[28]</ref> and <ref type="bibr" target="#b41">[42]</ref>. Assuming that obfuscation techniques allow only temporary protection, <ref type="bibr" target="#b27">[28]</ref> proposed to limit the lifetime of MoA according to the time needed for breaking the obfuscation. <ref type="bibr" target="#b41">[42]</ref> suggested hiding secret sub-programs in the remaining MoA code. Both approaches would allow implementing allocation subsystems for PSMA on the basis of temporal secrets. According to the limitation of lifetime, a synchronization concept that can handle lifecycles of agents, digital coins and allocations would be needed. Additionally, the question arises whether it is possible to prevent automatic analysis of obfuscated code (which would lower the lifetime of agents to a few seconds).</p><p>[45] proposed and <ref type="bibr" target="#b23">[24]</ref> extended the concept of Environmental Key Generation for MoA, addressing the idea that a MoA can use, e.g., private keys only when specific environmental information is available. Based on the comparison of doubled hashed information, this concept may be suitable for specific, pre-defined one-time-payments, as it allows allocations based on secrets until the right environment is found. Environmental Key Generation is not suitable for allocations needed in (multistage) PSMA, as this would require ex-ante knowledge of all future transactions (payer and payee) of each MoA.</p><p>[63], <ref type="bibr" target="#b65">[64]</ref> and <ref type="bibr" target="#b60">[60]</ref> suggested approaches based on Internal Hardware Extensions and Java Cards. Although these concepts of tamper-proof hosts-in-hosts would allow complying with the requirements on allocation subsystems, their practical applicability is doubtful since the hosts' principals would have to abandon their authority over the hosts. Also, the investment in hardware extension would increase the transaction costs.</p><p>The family of Reference States address approaches based on the ex-post comparison of MoA execution states. Two subclasses can be identified: approaches that deal with the ex-post comparison by hosts next in the migration route of MoA (cf. <ref type="bibr" target="#b17">[18]</ref>, <ref type="bibr" target="#b39">[40]</ref>, <ref type="bibr" target="#b53">[54]</ref>, <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr">[MaTM-2004]</ref>, <ref type="bibr" target="#b2">[3]</ref>) and approaches that address the comparison by principals after the MoA have finished their tasks (cf. <ref type="bibr" target="#b58">[58]</ref>, <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b65">[64]</ref>). This class of approaches is of limited applicability to PSMA, since reading of data is neither inhibited nor detectable.</p><p>The Signature Delegation group consists of undetachable signature (cf. <ref type="bibr" target="#b32">[33]</ref>, <ref type="bibr" target="#b11">[12]</ref>, <ref type="bibr" target="#b51">[52]</ref>, <ref type="bibr" target="#b7">[8]</ref>), proxy signature (cf. <ref type="bibr" target="#b46">[47]</ref>, <ref type="bibr" target="#b4">[5]</ref>) and blind signature concepts (cf. <ref type="bibr" target="#b19">[20]</ref>). These approaches are either insecure against the MHP (proxy and blind signatures) or restricted to a specific, in detail pre-described use (undetachable signatures). Thus, for an allocation subsystem the same applicability problem arises as when using Environmental Key Generation: ex-ante knowledge of all future transactions would be required.</p><p>An explicit approach to enable MoA to pay for, e.g., service access is presented by <ref type="bibr" target="#b14">[15]</ref>. Within his concept, a MoA belongs to a group of n MoA located at different hosts. The MoA cooperate when a payment is needed. Using a (k,n) threshold scheme (proposed by <ref type="bibr" target="#b50">[51]</ref>), each MoA carries a share of a secret, in this case a private key, and sends its share to a special MoA when payment is needed. No malicious host is able to steal or copy electronic money carried by the MoA without getting at least k shares from the independently migrating agents. The approach is designed for a one-time payment between a MoA and a host. It requires that the payee host does not execute the MoA. Also, the protocols only protect the money allocation of paying agents. Payments between two MoA are not protected by this concept.</p><p>Examining the five high-level requirements related to allocation subsystems, we have to note that, with the exception of Hardware Extensions, none of the outlined concepts is suited to serve as a basis for a PSMA yet. Either further development and evaluation is needed or the characteristics of the technology concepts themselves are not suitable for adaptation. For Hardware Extensions, their practical applicability is questionable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">An accounting supported PSMA</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">General conditions and basic assumptions</head><p>The development of an allocation subsystem for PSMA should take into account general conditions of MoAs' environments. By making following assumptions we tried to capture these conditions:</p><p>• Within MoAs' environments, two types of actors can be identified: MoA and (executing) hosts. Both are able to join and leave the network. • When a MoA is located on a host, it is not possible to detect what happens to it (e.g., if it is being copied or analyzed). Hosts have to be interpreted as black boxes, only revealing information about their internal processes when something leaves the box (cf. <ref type="bibr" target="#b27">[28]</ref>). • Within MoAs' environments, the only two ways to (at least partially) control hosts are by involving other hosts <ref type="foot" target="#foot_3">4</ref> (independently from agents executed on them) and, after the task has been accomplished, by the MoAs' principals (cf. <ref type="bibr" target="#b58">[58]</ref>). • MoA cannot keep data, code or execution state secret to the executing hosts and, at the same time, use it when interaction is required (binding existence of the MHP). • It is possible for MoA to carry data in a way that anyone can read and add data, but later manipulations on once written data can be identified (realized by public verifiable integrity, cf. <ref type="bibr" target="#b22">[23]</ref>, <ref type="bibr" target="#b52">[53]</ref>. As basic requirements we assume the existence of the following infrastructure and hosts' properties:</p><p>• Each host joining the environment has a (published) unique identifier (uid).</p><p>• A Public Key Infrastructure (PKI) exists, which enables (a) hosts to create and validate digital signatures (related to their uid), (b) principals to sign their MoA and (c) MoA to transport secrets for their principals (without using them). • An anonymization service exists that decouples MoA from their principals. As a result, everyone can trace MoA and their financial transfers without identifying the principal. • There is a clearing infrastructure acting as an institution that withdraws and accepts electronic coins. The clearing infrastructure always knows how much money circulates by balancing deposited and issued coins. As far as the last assumption is concerned, we decided to use digital coins according to the MicroMint micropayment scheme as it has been proposed by <ref type="bibr" target="#b45">[46]</ref>. MicroMint coins consist of a fixed number of strings (of equal bit-length) producing the same hash value when operated by a specific hash function. No computing-intensive public-key operations are required. Due to the non-injective and the collision resistance of the hash function, coin generating for a small number of coins is extremely expensive, but gets progressively cheaper (per coin) when generating more coins. Since coin production is economical only with a very large production volume, counterfeiting coins is prevented as it is uneconomical.</p><p>Our basic idea for an allocation subsystem is twofold, addressing both the position of the allocation subsystem and its openness. As far as position is concerned, the subsystem has to be managed not at the MoA level, but at the host level. That is, hosts manage the allocations between MoA and digital coins -they change allocations if MoA pay, verify allocations and manage valid transfer between each other if MoA migrate. Hosts, i.e., principals operating hosts, have to be responsible for a valid allocation management. To prevent tampering, hosts have to be real time controlled by other hosts, for instance, a group of hosts that cooperate for allocation management. MoAs are integrated in this allocation subsystem only passively for documentation and control. They carry information about allocations in a way that is not modifiable ex-post. In terms of openness, the idea is to restrict the PSMA and thus the allocation subsystem so that it is open to MoA and hosts, but "closed" to digital coins and allocations. Thus a currency area has to be created. Digital coins have to be valid only if they are located permanently inside this area. Once they leave the area, coins are not restorable. As a consequence, the overall amount of money in circulation is constant (or decreasing). Detection mechanisms are needed to give alert when the amount rises. Double spent coins and the use of counterfeit coins can thus be avoided.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Abstract concept of an accounting based PSMA allocation system</head><p>Using accounting techniques for a PSMA allocation system, an accounting web for hosts and MoA has to be created. Normally, accounting systems are kept by one central institution. For PSMA, the accounting web needs to be both distributed and decentralized, since a centralized design would lead to higher transaction costs (cf. Section 2). It would also raise the question of (secure) authentication and it does not comply with the offline characteristics of digital money given in Section 2.</p><p>Our concept uses files representing accounts. These account files are made forward secure by cryptographic methods, i.e., they are designed to enable writing and reading to everyone, but inhibit (unnoticeable) deletion and manipulation of previously stored information (cf. <ref type="bibr" target="#b65">[64]</ref>, <ref type="bibr" target="#b22">[23]</ref>, <ref type="bibr" target="#b52">[53]</ref> for forward and publicly verifiable integrity). The accounts are managed by hosts and are related to groups of hosts, (single) hosts and MoA. Each financial transaction is recorded by a double-entry registration in at least two accounts. The accounting web is closed, i.e., no transaction outside of and, even more important, no transaction back into the accounting web is allowed. The clearing infrastructure is part of the accounting web. Also, only MoAs are allowed to pay and receive payments and thus own money. Hosts have to be represented by (non-mobile) agents when they receive or spend money.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Structure of the accounting web:</head><p>In addition to the account ! I related to the clearing infrastructure, an accounting web is build on the basis of three kinds of account rows<ref type="foot" target="#foot_4">5</ref> : rows of accounts ! MA related to MoA, rows of accounts ! H related to hosts and rows of accounts ! G related to groups of hosts.</p><p>Within an accounting web consisting of only one group G=1 of n hosts and m MoA, n,m " N, located on these hosts, the following accounts exist:</p><p>• ! 1 I , the clearing infrastructure account, where all withdrawals and deposits are recorded,</p><p>• ! 1 G , the group account, where all input and output transactions of the group G=1 are recorded,</p><p>• ! 1 H ,...,! k H ,...,! n H , the hosts' accounts, where all transaction between hosts (i.e., agents located at these hosts) are recorded. Each account ! k H is located on and managed by one host. The set of all hosts' accounts ! k H that belong to group G=1 is named T G=1 H ,</p><p>• ! 1 MA ,...,! i MA ,...,! m MA , the MoA accounts where all transaction between agents are recorded.</p><p>Each account ! i MA is related to and located at a MoA and managed by the hosts executing this agent. The set of all MoA accounts of group G=1 is named T G=1 MA , while the set of all MoA related to host k is T H =k</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>MA</head><p>Within a group of hosts, the sum of the MoA account row, and the sum the hosts account row and the group account represent the same value: the total amount of money that exists within this group.</p><formula xml:id="formula_0">(1) ! 1 G = ! k H k=1 n " = ! i MA i=1 m</formula><p>" , where |!| is the sum of all entries of an account ! , Within the accounting web, the sum of all group accounts has to be equal to the sum of the clearing infrastructure account. For a given one-group accounting web, that is ! 1</p><formula xml:id="formula_1">I = ! 1 G .</formula><p>For accounting webs consisting of o groups, o " N, it has the form:</p><formula xml:id="formula_2">(2) ! 1 I = ! p G p=1 o "</formula><p>As mentioned above, the accounting web has to be open for hosts and MoA. MoA can enter the accounting web by migrating to a host that is already member of the accounting web and by receiving an empty or credited account from the clearing infrastructure. When receiving a credited account, the MoA also receives digital coins (of the same value) from the issuer. It is not possible for MoA to bring Each accounting function is related to entries in at least two accounts. These entries include the receiving/spending account, the value v that is being transferred, the IDs of the coins used for the transfer, a time stamp, the host recorded the entry and a description of the service/resource paid/sold.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Characteristics:</head><p>The accounting web described above allows controlling the integrity of the system as it allocates digital coins to MoA. The allocation is realized by recording transfer of ownership to MoA, hosts and group accounts. The presented accounting based allocation concept addresses all five requirements shown in Section 3.1. Fraud allocations can be detected in two ways: by ex post examination of the payments a MoA has made and by checking the account balance.</p><p>The ex-post examination of MoA payments is still comparable to conventional logging. Each principal is able to check the income and the payments of its MoA either after the task fulfillment or after a specific time period. He can thus identify payments that do not correspond to the agent's task or, when for instance cryptographic tracing according to <ref type="bibr" target="#b58">[58]</ref> is enabled, those that do not match the agent's execution states. Unlike normal logging, each log entry exists both in the agent's account and the other accounts charged. Therefore the MoA is traceable within the accounting web as long as it possesses at least one digital coin. Also, when fixing this coin to the MoA, no host is able to delete the MoA. The accounting trace would end at this host, identifying it as malicious.</p><p>With the account balance, we describe the validity of equation ( <ref type="formula">1</ref>) for all groups r of hosts and the equation (2) for the whole accounting web at any time of a PSMA lifecycle. The validity of equation ( <ref type="formula">1</ref>) is checked by a group r of n hosts each time a MoA enters or leaves the hosts that belong to group r. Each host has to cast the MoA accounts located on it and publish the balance for the other group members. All hosts within the group are able to check if the overall balance is equal to the balance of the group account</p><formula xml:id="formula_3">! p G . If ! p G " ! i MA i =1 m #</formula><p>an error or fraud is detected and further steps have to be taken, e.g., the check of equation ( <ref type="formula">2</ref>) and the concrete analysis of the group's activities.</p><p>As long as (1) and ( <ref type="formula">2</ref>) are true, the amount of money withdrawn (and not yet deposited) is equal to the amount of money within the accounting web. It is not possible to double spent digital coins, since with the (second) entry this balance is lost and the double-spending is detected by the next balance check. Also, when coins are stolen, e.g., by a malicious host executing a MoA, the stolen money is worthless, as its reintegration into the accounting web would either lead to a discrepancy or, when kept outside the accounting web, cannot be deposited back in the clearing infrastructure. No payee will accept it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">A simple example</head><p>The simple example of an accounting web supported PSMA addresses the prevention of double spending coins by detecting account unbalances. Thus, we make no use of the option to compare coin IDs as they are stored within the agents', hosts' and groups' accounts. Also, we abstain from an explicit integration of the clearing infrastructure, i.e., the amount of circulating money is constant.</p><p>The accounting web consists of two groups with n=2 hosts. At each host, one MoA is located. Each MoA carries two digital coins already recorded in the agents', the hosts' and the groups' accounts. One coin is fixed to the agent, i.e., the agent is not allowed to spend the coin. According to this structure illustrated in figure <ref type="figure" target="#fig_0">2</ref>, we have the following accounts:</p><p>• ! I , where ! I is constant and ! I = 8 , </p><formula xml:id="formula_4">• ! 1 G , ! 2 G , where ! 1 G = ! 2 G = 4 , • ! 1 H , ! 2 H , ! 3 H , ! 4 H , where ! 1 H = ! 2 H = ! 3 H = ! 4 H = 2 • ! 1 MA , ! 2 MA , ! 3 MA , ! 4 MA , where ! 1 MA = ! 2 MA = ! 3 MA = ! 4 MA = 2</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Generating an agent 1' :</head><p>With the migration of agent 1* from host 1 to, e.g., host 2 , the transaction  For the detection of double spending, a transfer of both coin 1 and 1* is needed. One option to achieve this is by imposing time restrictions on MoA stopovers on hosts or group internal agent rotation directives. There are also additional options for malicious hosts when more than one corrupt actor exists, but at least they all will be detected when reintegrating double spent money into the accounting web (at least when depositing the false coins).</p><formula xml:id="formula_5">e 1 ! 1 H ; ! 2 H ; id coin 1* ( ) ( ) =</formula><formula xml:id="formula_6">! i MA " = 5 , i = 1,1</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Summary and Future Work</head><p>In this paper we addressed the design of a PSMA. We identified requirements on PSMA and discussed the suitability of existing technical concepts for an implementation of a coin-MoA allocation system. We presented an account-based solution giving a rough concept of a distributed and decentralized accounting web. The web is managed by all hosts executing MoA. Malicious behavior of one host is controlled by the hosts' community. The accounting web is designed to be open for MoA and hosts, but closed for money.</p><p>As a result, continuous allocation of (digital) coins and MoA can be achieved. The accounting web also prevents double-spending and theft of coins as it allows an ex-post detection of cheating hosts. The detection is possible both for MoA principals after the agents have fulfilled their task as well as for other hosts according to an unbalance arising when, e.g., double-spent coins are used. Even MoA brainwashing (according to financial transactions) by malicious hosts may possibly be preventable by combining our concept with cryptographic trace methods.</p><p>Our research on accounting based allocation systems and PSMA is still in progress. Therefore some aspects/questions related to the application of accounting webs for MoA-coin allocation are not discussed within this paper. These include:</p><p>• The need for digital coins when the accounting web is finalized: is it possible to expand the allocation subsystem to a full PSMA without coins? • The systems' behavior when hosts or groups of hosts crash: is the money also lost when a host disconnects due to a malfunction? What happens with the group if one host disappears? • Malicious groups of hosts: how can we avoid groups consisting of only malicious hosts? And what happens if a malicious host is detected? • The economic transaction recorded by the accounting web: actually only financial transactions are recorded. Are there any advantages when, e.g., the service executions are also journalized? As next steps in the implementation of an account-based allocation system we will address concrete realization of both (1) accounts and (2) protocols for hosts and MoA interaction. While the first step has to take cryptographic methods and the data of the recorded entries into account, the second has to include specifications for hosts' and MoA entrance and exit of the accounting web, protocols ensuring consistent entries to accounts as well as for checking the accounting balance and rules about the consequences of detected unbalance.</p><p>In our future research, we will use the axiomatic-based accounting theory as a method to address these aspects and to advance the given rough concept to a more detailed one. For a final evaluation we plan to use a game theoretic analysis of the principals' behaviors affected by our concept.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Structure of hosts, MoA and accounts Assume that host 1 is malicious and generates coin 1* by copying coin 1 of agent 1 . When host 1 is the only malicious or corrupt actor (hosts and MoA) within the web and only MoA are allowed to use money, host 1 is able to spend coin 1* in two ways only: (1) to generate agent 1* that migrates (away from host 1 ) and spends coin 1* ; (2) to disguise itself as agent 1 and spend coin 1* to e.g. agent 4 .</figDesc><graphic coords="8,90.00,371.36,216.00,161.52" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,90.00,164.00,313.20,234.96" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>1   </figDesc><table><row><cell cols="4">is recorded within ! 1 H and ! 2 H . Assume now that agent 1 has to migrate too, e.g. to host 2 , the</cell></row><row><cell>transaction</cell><cell>e 2 ! 1 H ; ! 2 H ; id coin 1 , coin 2 ( (</cell><cell>)</cell><cell>) = 2</cell></row><row><cell cols="4">would lead to an unbalance within group 1 , as ! 1 G = 4 (nothing has entered or left the group) and</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>Also, when agent 1 migrates to, e.g., host 2 and thus a transaction e 4 ! 1 H ; ! 2 H ; id coin 1 ,coin 2</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell>(</cell><cell>(</cell><cell>) ) = 2</cell></row><row><cell></cell><cell cols="4">is needed, an unbalance occurs within group 1 , as ! 1 G</cell><cell>= 3 (e 3 was recorded to ! 1 G )</cell></row><row><cell>and</cell><cell>"</cell><cell>! i MA</cell><cell>= 4 .</cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="2">3 ! 1 G ,! 1 H ,! 1 MA ; ! 2 G ,! 4 H ,! 4 MA ; id coin 1* ( (</cell><cell>)</cell><cell>) = 1.</cell></row></table><note>*,2 .   Masquerating as agent 1 : Using this second option, host 1 would initiate a transaction e</note></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Within this paper, owners of Mobile Agents or hosts are named principals. Except for the term, there are no relations to the concept of principals used in the principal-agency theory.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">With the allocation of MoA and coins, we address the concept of linking at least one coin to one MoA in a way that only this agent can dispose of the coin.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">For our work, we will only focus on problems caused by the MHP. Other security issus related to, e.g., insecure networks or malicious agents will not be considered.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">This assumtion bases on proposition 1 given in<ref type="bibr" target="#b1">[2]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_4">An account row is a set of accounts structuring a datum in a specific way. Multiple account rows addressing the same datum allow different perspectives on this datum, e.g. source and disposition of funds.</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>money with them into the accounting web. Hosts can enter the accounting web when enough new hosts are available for a new group (in our specification: n hosts). They are also not allowed to bring money with them and receive their accounts from the clearing infrastructure. Both MoA and hosts are able to leave the web. Since money cannot re-enter the accounting web, they need to be cleared by transferring all money to other hosts/agents staying inside the web. Otherwise the money is lost.</p><p>Transactions within the accounting web: Within the accounting web, each financial transaction, i.e., transfers of coins from one MoA to another or MoA migration, generates entries to the accounts. We describe transactions by accounting functions e f , f = 1,…,h , h " N. An accounting function e f links specific debit and credit accounts and a set of coin IDs to a value. For all e f applies:</p><p>(3) e f : T D ! T C ! ID " V , where T D gives all accounts being debited, T C gives all accounts being credited, ID is the set of all coins (coin id) and V is the set of all values composable of the elements of ID.</p><p>Thus, within a specific group of hosts three archetypes of transactions can be identified:</p><p>• payments between two MoA located at the same host:</p><p>• payments between MoA located at different hosts:</p><p>• migrations of a MoA between hosts:</p><p>With more than one group, two additional archetypes can be identified:</p><p>• migrations of MoA between groups of hosts:</p><p>• payments between MoA located in different groups of hosts:</p><p>Considering the clearing infrastructure, another two archetypes of financial transactions can be identified:</p><p>• withdrawal of digital coins: e f ! I { } , ! q G ,! l H ,! </p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Classification and Characteristics of Electronic Payment Systems</title>
		<author>
			<persName><forename type="first">D</forename><surname>Abrazhevich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd International Conference on Electronic Commerce and Web Technologies (EC-Web&apos;01)</title>
				<meeting>the 2nd International Conference on Electronic Commerce and Web Technologies (EC-Web&apos;01)<address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">2115</biblScope>
			<biblScope unit="page" from="81" to="90" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Cryptographic Security for Mobile Code</title>
		<author>
			<persName><forename type="first">J</forename><surname>Algesheimer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Cachin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Camenisch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Karjoth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&amp;P&apos;01)</title>
				<meeting>the 2001 IEEE Symposium on Security and Privacy (S&amp;P&apos;01)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="2" to="11" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Boosting m-Business Using a Truly Secured Protocol for Data Gathering Mobile Agents</title>
		<author>
			<persName><forename type="first">R</forename><surname>Al-Jaljouli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Mobile Business (ICMoA&apos;05</title>
				<meeting>the International Conference on Mobile Business (ICMoA&apos;05</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Programming Sensor Networks with Mobile Agents</title>
		<author>
			<persName><forename type="first">B</forename><surname>Athanassios</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 6th International Conference on Mobile data management</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Chrysanthis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Samaras</surname></persName>
		</editor>
		<meeting>the 6th International Conference on Mobile data management<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="252" to="256" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Secure Method for Signature Delegation to Mobile Agents</title>
		<author>
			<persName><forename type="first">O</forename><surname>Bamaska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2004 ACM symposium on Applied computing (ACM SAC&apos;04)</title>
				<meeting>the 2004 ACM symposium on Applied computing (ACM SAC&apos;04)</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="813" to="818" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Ensuring the Integrity of Agent-Based Computations by Short Proofs</title>
		<author>
			<persName><forename type="first">I</forename><surname>Biehl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Meyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wetzel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mobile Agents</title>
				<editor>
			<persName><forename type="first">K</forename><surname>Rothermel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Hohl</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1998">1998</date>
			<biblScope unit="volume">1477</biblScope>
			<biblScope unit="page" from="183" to="194" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Classification of Malicious Host Threats in Mobile Agent Computing</title>
		<author>
			<persName><forename type="first">E</forename><surname>Bierman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Cloete</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology (SAICSIT&apos;02)</title>
				<meeting>the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology (SAICSIT&apos;02)</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="141" to="148" />
		</imprint>
	</monogr>
	<note>ACM International Conference Proceeding Series</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">On Mobile Agent Based Transactions in Moderatly Hostile Environments</title>
		<author>
			<persName><forename type="first">N</forename><surname>Borselius</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Mitchell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Wilson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st International IFIP Working Conference on Network Security (IFIP I-NetSec&apos;01)</title>
				<meeting>the 1st International IFIP Working Conference on Network Security (IFIP I-NetSec&apos;01)</meeting>
		<imprint>
			<publisher>Kluwer Academic Publisher</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="173" to="186" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Borchert</surname></persName>
		</author>
		<title level="m">Geld und Kredit</title>
				<meeting><address><addrLine>Wien</addrLine></address></meeting>
		<imprint>
			<publisher>Oldenburg Verlag</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
	<note>7th edition</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">One-Round Secure Computation and Secure Autonomous Mobile Agents</title>
		<author>
			<persName><forename type="first">C</forename><surname>Cachin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Camenisch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kilian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Müller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 27th International Colloquium of Automata, Languages and Programming (ICALP&apos;00)</title>
				<meeting>the 27th International Colloquium of Automata, Languages and Programming (ICALP&apos;00)<address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2000">2000</date>
			<biblScope unit="volume">1853</biblScope>
			<biblScope unit="page" from="512" to="523" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Mobile Agents: Are They a Good Idea?</title>
		<author>
			<persName><forename type="first">D</forename><surname>Chess</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Harrison</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kershenbaum</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mobile Object Systems -Towards the Programmable Internet</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">J</forename><surname>Vitek</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1222">1222. 1997</date>
			<biblScope unit="page" from="25" to="45" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Analysis and design of an advanced Infrastructure for Secure and Anonymous Electronic Payment Systems on the Internet</title>
		<author>
			<persName><forename type="first">J</forename><surname>Claessens</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
		<respStmt>
			<orgName>Katholieke Universiteit Leuven</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. Thesis</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions</title>
		<author>
			<persName><forename type="first">J</forename><surname>Claessens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Preneel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Vandewalle</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Internet Technologie</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="28" to="48" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">RDS: Remote Distributed Scheme for Protecting Mobile Agents</title>
		<author>
			<persName><forename type="first">A</forename><surname>Dadon-Elichai</surname></persName>
		</author>
		<ptr target="http://www.aamas2004.org" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd International Joint Conference on Autonomous Agents &amp; Multi Agent Systems (AAMAS&apos;04)</title>
				<meeting>the 3rd International Joint Conference on Autonomous Agents &amp; Multi Agent Systems (AAMAS&apos;04)</meeting>
		<imprint>
			<date type="published" when="2005-06-20">June 20th, 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Payment Agents</title>
		<author>
			<persName><forename type="first">A</forename><surname>Das</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Payment Technologies for E-Commerce</title>
				<editor>
			<persName><forename type="first">W</forename><surname>Kou</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="149" to="170" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Secure Multi-Agent Computations</title>
		<author>
			<persName><forename type="first">R</forename><surname>Endsuleit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Mie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of International Conference on Security and Management (Sam&apos;03)</title>
				<meeting>International Conference on Security and Management (Sam&apos;03)</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="149" to="155" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<ptr target="https://www.ecb.int/pub/pdf/other/emoneyen.pdf" />
		<title level="m">Report on Electronic Money</title>
				<imprint>
			<date type="published" when="1998-02-08">1998. February 8th, 2006</date>
		</imprint>
		<respStmt>
			<orgName>European Central Bank</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Security for Mobile Agents: Authentication and state appraisal</title>
		<author>
			<persName><forename type="first">W</forename><surname>Farmer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Guttmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Swarup</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 4th European Symposium on Research in Computer Security (ESORICS&apos;96)</title>
				<meeting>the 4th European Symposium on Research in Computer Security (ESORICS&apos;96)<address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1996">1996</date>
			<biblScope unit="volume">1146</biblScope>
			<biblScope unit="page" from="118" to="130" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">The Mobile Agent Paradigm Meets Digital Document Technology: Designing for Autonomous Media Collection</title>
		<author>
			<persName><forename type="first">B</forename><surname>Falchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Karmouch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Application. Springer</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="137" to="166" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Blinded-Key Signatures: securing private keys in mobile agents</title>
		<author>
			<persName><forename type="first">De</forename><surname>Ferreira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Carvalho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dahab</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2002 ACM symposium on Applied computing (ACM SAC&apos;02)</title>
				<meeting>the 2002 ACM symposium on Applied computing (ACM SAC&apos;02)</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="82" to="86" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Idream: Intrusion detection and response executed with agent mobility -the conceptual model based on self-organizing natural systems</title>
		<author>
			<persName><forename type="first">N</forename><surname>Foukia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Engineering Self-Organising Applications Workshop (ESOA&apos;04)</title>
				<meeting>the Engineering Self-Organising Applications Workshop (ESOA&apos;04)</meeting>
		<imprint>
			<publisher>AAMoAS conference</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Understanding Code Mobility</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fuggetta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">P</forename><surname>Picco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Vigna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Software Engineering</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="342" to="361" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Performance Evaluation of Data Integrity Mechanism for Mobile Agents</title>
		<author>
			<persName><forename type="first">V</forename><surname>Gunupudi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tate</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 2004 IEEE Conference on Information technology: Coding and Computing (ITCC&apos;04)</title>
				<meeting>2004 IEEE Conference on Information technology: Coding and Computing (ITCC&apos;04)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="62" to="69" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Using Dynamic Adaptability to Protect Mobile Agents Code</title>
		<author>
			<persName><forename type="first">S</forename><surname>Hacini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC&apos;05)</title>
				<meeting>the International Conference on Information Technology: Coding and Computing (ITCC&apos;05)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="49" to="52" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Anforderungen an Zahlungsverfahren im E-Commerce</title>
		<author>
			<persName><forename type="first">J</forename><surname>Henkel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">E-Commerce und E-Payment</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Teichmann</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Nonnenmacher</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Henkel</surname></persName>
		</editor>
		<meeting><address><addrLine>Wiesbaden</addrLine></address></meeting>
		<imprint>
			<publisher>Gabler</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="103" to="121" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">A Model of Attacks of Malicious Hosts Against Mobile Agents</title>
		<author>
			<persName><forename type="first">F</forename><surname>Hohl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 4th ECOOP Workshop on Mobile Object Systems (MOS&apos;98)</title>
		<title level="s">LNCS</title>
		<meeting>the 4th ECOOP Workshop on Mobile Object Systems (MOS&apos;98)<address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1998">1998</date>
			<biblScope unit="volume">1543</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">A Protocol to Detect Malicious Host Attacks by Using Reference States</title>
		<author>
			<persName><forename type="first">F</forename><surname>Hohl</surname></persName>
		</author>
		<idno>Nr. 09/99</idno>
		<ptr target="ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/TR-1999-09/TR-1999-09.pdf" />
		<imprint>
			<date type="published" when="2005-10-10">October 10th, 2005</date>
		</imprint>
	</monogr>
	<note type="report_type">Report</note>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><surname>Hohl</surname></persName>
		</author>
		<title level="m">Sicherheit in Mobile-Agenten-Systemen</title>
				<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
		<respStmt>
			<orgName>Universität Stuttgart</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. Thesis</note>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Mobile Agents for Telecommunication Applications</title>
	</analytic>
	<monogr>
		<title level="m">5th International Workshop (MoATA 2003</title>
				<editor>
			<persName><forename type="first">E</forename><surname>Horlait</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Magedanz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><forename type="middle">H</forename><surname>Glitho</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="volume">2881</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Countermeasures for Mobile Agent Security</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">A</forename><surname>Jansen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Communications. Special issue on advanced security techniques for network protection</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">17</biblScope>
			<biblScope unit="page" from="1667" to="1676" />
			<date type="published" when="2000">2000</date>
			<publisher>Elsevier Science</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<author>
			<persName><forename type="first">H.-J</forename><surname>Jarchow</surname></persName>
		</author>
		<title level="m">Theorie und Politik des Geldes</title>
				<meeting><address><addrLine>Göttingen</addrLine></address></meeting>
		<imprint>
			<publisher>Vandenhoeck &amp; Ruprecht</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
	<note>11th edition</note>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Mobile Agents for Telecommunication Applications</title>
	</analytic>
	<monogr>
		<title level="m">4th International Workshop (MoATA 2002</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Karmouch</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Magedanz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Delgado</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2521</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Secure Transactions with Mobile Agents in Hostile Environments</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kotzanikolaou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Burmester</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Chrissikopoulos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Australasian Conference on Information Security and Privacy (ACISP&apos;00)</title>
				<meeting>the Australasian Conference on Information Security and Privacy (ACISP&apos;00)<address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2000">2000</date>
			<biblScope unit="volume">1841</biblScope>
			<biblScope unit="page" from="289" to="297" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Applying Mobile Agent technology to Intrusion Detection</title>
		<author>
			<persName><forename type="first">C</forename><surname>Krügel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Toth</surname></persName>
		</author>
		<idno>TUV-1841-2002-31</idno>
		<ptr target="http://www.infosys.tuwien.ac.at/reports/bin/abstract.pl?report=TUV-1841-2002-31" />
	</analytic>
	<monogr>
		<title level="m">Arbeitsbericht Nr</title>
				<imprint>
			<date type="published" when="2004">March, 8th 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Transactional Agent Model for Fault-Tolerant Object Systems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kaneda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tanka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Enkokido</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Takizawa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2005 ACM symposium on Applied computing</title>
				<meeting>the 2005 ACM symposium on Applied computing<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<biblScope unit="page" from="1133" to="1138" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">The use of encrypted Functions for Mobile Agent Security</title>
		<author>
			<persName><forename type="first">H</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Alves-Foss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Harrison</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS&apos;04)</title>
				<meeting>the 37th Annual Hawaii International Conference on System Sciences (HICSS&apos;04)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page">390297</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Function Hiding Based on Error Correcting Codes</title>
		<author>
			<persName><forename type="first">S</forename><surname>Loureiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Molva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Workshop on Cryptographic Techniques and Electronic Commerce (CryptTEC&apos;99)</title>
				<meeting>the International Workshop on Cryptographic Techniques and Electronic Commerce (CryptTEC&apos;99)</meeting>
		<imprint>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="92" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">A Secure Mobile Agent System Model Based on Extended Elementary Object System</title>
		<author>
			<persName><forename type="first">L</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Murata</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 28th Annual International Computer Software and Applications Conference (COMPSAC&apos;04)</title>
				<meeting>the 28th Annual International Computer Software and Applications Conference (COMPSAC&apos;04)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="218" to="223" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Trend Wars: Mobile Agent Applications</title>
		<author>
			<persName><forename type="first">D</forename><surname>Milojicic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Concurrency</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="80" to="90" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Cryptographic Support for Fault-Tolerant Distributed Computing</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Minsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Renesse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Schneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Stoller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications</title>
				<meeting>the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page" from="109" to="114" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">An Extensible Mobile-Agent-Based Framework for Coordinating Distributed Information Retrival Applications</title>
		<author>
			<persName><forename type="first">E</forename><surname>Olougouna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pierre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Glitho</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mobile Agents in Telecommunication 2002</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Karmouch</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Magedanz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Delgado</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2521</biblScope>
			<biblScope unit="page" from="281" to="291" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Countering Security Vulnerabilities in Agent Execution using a Self Executing Security Examination</title>
		<author>
			<persName><forename type="first">J</forename><surname>Page</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zaslavsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Indrawan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd International Joint Conference of Autonomous Agents &amp; Multi Agent Systems (AAMAS&apos;04)</title>
				<meeting>the 3rd International Joint Conference of Autonomous Agents &amp; Multi Agent Systems (AAMAS&apos;04)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="1486" to="1487" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Mobile Agents for Telecommunication Applications</title>
	</analytic>
	<monogr>
		<title level="m">Third International Workshop</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Pierre</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Glitho</surname></persName>
		</editor>
		<meeting><address><addrLine>MoATA; Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001. 2001</date>
			<biblScope unit="volume">2164</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<monogr>
		<title level="m" type="main">Analysis and design of Off-line Electronic Payment Systems</title>
		<author>
			<persName><forename type="first">C</forename><surname>Radu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
		<respStmt>
			<orgName>Katholieke Universiteit Leuven</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Dissertation</note>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">Environmental Key Generation towards Clueless Agents</title>
		<author>
			<persName><forename type="first">J</forename><surname>Riordan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Schneier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mobile Agents and Security. Springer, LNCS 1419</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Vigna</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="15" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">PayWord and MicroMint: Two simple micropayment schemes</title>
		<author>
			<persName><forename type="first">R</forename><surname>Rivest</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shamir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 1996 International Workshop on Security Protocols</title>
				<meeting>1996 International Workshop on Security Protocols<address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1997">1997</date>
			<biblScope unit="volume">1189</biblScope>
			<biblScope unit="page" from="69" to="87" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<monogr>
		<title level="m" type="main">Secure Mobile Agent Digital Signatures with Proxy Certificates</title>
		<author>
			<persName><forename type="first">A</forename><surname>Romao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Silva</surname></persName>
		</author>
		<editor>Ye, Y.</editor>
		<editor>Liu, J.</editor>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="206" to="220" />
			<pubPlace>Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Towards Mobile Cryptography</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sander</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Tschudin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1998 IEEE Symposium on Security and Privacy (S&amp;P&apos;01)</title>
				<meeting>the 1998 IEEE Symposium on Security and Privacy (S&amp;P&apos;01)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="215" to="224" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Non-interactive CryptoComputing for NC</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sander</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Young</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">40th Annual Symposium on Foundations of Computer Science (FOCS&apos;99)</title>
				<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="554" to="567" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Schaal</surname></persName>
		</author>
		<title level="m">Geldtheorie und Geldpolitik</title>
				<meeting><address><addrLine>Wien</addrLine></address></meeting>
		<imprint>
			<publisher>Oldenburg Verlag</publisher>
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
	<note>4th edition</note>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">How to share a secret</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shamir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="612" to="613" />
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">A Security Scheme of Electronic Commerce for Mobile Agents Uses Undetachable Digital Signatures</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd International Conference on Information Security</title>
				<meeting>the 3rd International Conference on Information Security</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="242" to="243" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<title level="a" type="main">A New Approach for Computation Result Protection in the Mobile Agent Paradigm</title>
		<author>
			<persName><forename type="first">S</forename><surname>Songsiri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC&apos;05)</title>
				<meeting>the 10th IEEE Symposium on Computers and Communications (ISCC&apos;05)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="575" to="581" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<analytic>
		<title level="a" type="main">Certificates for Mobile Code Security</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">K</forename><surname>Tan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Moreau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 17th ACM Symposium on Applied Computing (ACM SAC&apos;02)</title>
				<meeting>the 17th ACM Symposium on Applied Computing (ACM SAC&apos;02)</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="76" to="81" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">Mobile Agent Security through Multi-Agent Cryptographic Protocols</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R</forename><surname>Tate</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">4th International Conference on Internet Computing (IC&apos;03)</title>
				<imprint>
			<publisher>CSREA Press</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="462" to="468" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<analytic>
		<title level="a" type="main">Crawlets: Agents for High Performance Web Searche Engines</title>
		<author>
			<persName><forename type="first">P</forename><surname>Thai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Chamg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Agha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mobile Agents</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Picco</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">2240</biblScope>
			<biblScope unit="page" from="119" to="2001" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">E</forename><surname>Velazquez</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">A Mobile Agent Prototype for Distributed Search</title>
		<author>
			<persName><forename type="first">N</forename><surname>Santoro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nayak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Pierre</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Glitho</surname></persName>
		</editor>
		<meeting>the Third International Workshop on Mobile Agents for Telecommunication Applications<address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">2164</biblScope>
			<biblScope unit="page" from="245" to="254" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">Cryptographic Traces for Mobile Agents</title>
		<author>
			<persName><forename type="first">G</forename><surname>Vigna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mobile Agent Security</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Vigna</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1998">1998</date>
			<biblScope unit="volume">1419</biblScope>
			<biblScope unit="page" from="137" to="153" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b59">
	<analytic>
		<title level="a" type="main">Mobile Agents: Ten Reasons For Failure</title>
		<author>
			<persName><forename type="first">G</forename><surname>Vigna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM&apos;04)</title>
				<meeting>the 5th IEEE International Conference on Mobile Data Management (MDM&apos;04)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="298" to="299" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b60">
	<analytic>
		<title level="a" type="main">Multi-Mobile Agents&apos; Seperation Scheme in Java Card Application for Mobile Agent&apos;s Security</title>
		<author>
			<persName><forename type="first">R</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2004 IEEE International Conference on Service Computing (SCC&apos;04)</title>
				<meeting>the 2004 IEEE International Conference on Service Computing (SCC&apos;04)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="623" to="628" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b61">
	<analytic>
		<title level="a" type="main">Mobile Agent -Based Module Distribution in Heterogenous Networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Wagner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the first conference on Computing Frontiers</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Stamatis</surname></persName>
		</editor>
		<meeting>the first conference on Computing Frontiers</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<biblScope unit="page" from="288" to="293" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b62">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Weber</surname></persName>
		</author>
		<title level="m">Zahlungsverfahren im Internet -Zahlungen mittels Kreditkarte, Lastschrift und Geldkarte</title>
				<meeting><address><addrLine>Köln</addrLine></address></meeting>
		<imprint>
			<publisher>Verlag Dr. Otto Schmidt</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b63">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">U</forename><surname>Wilhelm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Staatmann</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b64">
	<analytic>
		<title level="a" type="main">Introducing Trusted Third Parties to the Mobile Agent Paradigm</title>
		<author>
			<persName><forename type="first">L</forename><surname>Buttyan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Secure Internet Programming: Security Issues for Mobile and Distributed Objects</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Vitek</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Jensen</surname></persName>
		</editor>
		<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">1603</biblScope>
			<biblScope unit="page" from="469" to="489" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b65">
	<analytic>
		<title level="a" type="main">A Sanctuary for Mobile Agents</title>
		<author>
			<persName><forename type="first">B</forename><surname>Yee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Secure Internet Programming: Security Issus for Mobile and Distributed Objects</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Vitek</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Jensen</surname></persName>
		</editor>
		<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">1603</biblScope>
			<biblScope unit="page" from="261" to="274" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b66">
	<analytic>
		<title level="a" type="main">PICC: A Secure Mobile Agent Framework Based on Garbled Circuit</title>
		<author>
			<persName><forename type="first">M</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Cheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA&apos;05)</title>
				<meeting>the 19th International Conference on Advanced Information Networking and Applications (AINA&apos;05)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="357" to="362" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b67">
	<analytic>
		<title level="a" type="main">Mobile Agents and the SARA Digital Library</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Rana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Georgousopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Walker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Williams</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Seventh IEEE Advances in Digital Libraries 2000 (ADL &apos;00)</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Papazoglou</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Sheth</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="71" to="78" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b68">
	<analytic>
		<title level="a" type="main">A Novel Distributed Intrusion Detection Model Based on Mobile Agent</title>
		<author>
			<persName><forename type="first">S</forename><surname>Zhicai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhenzhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mingzeng</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd international conference on Information security</title>
				<editor>
			<persName><forename type="first">J</forename><surname>White</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Sheng</surname></persName>
		</editor>
		<meeting>the 3rd international conference on Information security<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="155" to="159" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b69">
	<analytic>
		<title level="a" type="main">Verifiable Distributed Oblivious Transfer and Mobile Agent Security</title>
		<author>
			<persName><forename type="first">S</forename><surname>Zhong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">R</forename><surname>Yang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2003 Joint Workshop on Foundations of Mobile Computing (DIALM-POMC&apos;03)</title>
				<meeting>the 2003 Joint Workshop on Foundations of Mobile Computing (DIALM-POMC&apos;03)<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="12" to="21" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
