Chris J. Mitchell, Borselius, N. and Wilson, A. (2002) A pragmatic alternative to undetectable signatures. ACM SIGOPS Operating Systems Review, 36 (2).
Full text access: Open
A 'pragmatic' alternative to undetachable signatures is proposed. Undetachable signatures were introduced by Sander and Tschudin, [4], as a means of giving a mobile agent the means to sign a message on behalf of a user, without endangering the user's private key. The alternative discussed in this paper involves the use of conventional signatures and public key certificates.
This is a Published version This version's date is: 04/2002 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/b91825d1-2d4c-8507-77c0-fe0c08b22243/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010
This is the final draft version of the paper that appeared in 'ACM SIGOPS Operating Systems Review', 36(2), 2002.
1 Bruno Crispo, Delegation of Responsibility (Position Paper), Proceedings of the 6th International Workshop on Security Protocols, p.118-124, April 15-17, 1998 2 B. Crispo and B. Christianson. A note about the semantics of delegation. Preprint, 1999. 3 Panayiotis Kotzanikolaou , Mike Burmester , Vassilios Chrissikopoulos, Secure Transactions with Mobile Agents in Hostile Environments, Proceedings of the 5th Australasian Conference on Information Security and Privacy, p.289-297, July 10-12, 2000 4 Tomas Sander , Christian F. Tschudin, Protecting Mobile Agents Against Malicious Hosts, Mobile Agents and Security, p.44-60, January 1998 5 V. Varadharajan, P. Allen, and S. Black. An analysis of the proxy problem in distributed systems. In Proceedings: 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages 255-275. IEEE Computer Society Press, Los Alamitos, California, May 1991.