The aim of the work presented in this paper is to check cryptographic protocols for mobile agents against both network intruders and malicious hosts using formal methods. We focus attention on data integrity properties and show how the techniques used for classical message-based protocols such as authentication protocols can be applied to mobile agent systems as well. To illustrate our approach, we use a case study taken from the literature and show how it can be specified and verified using some currently available tools
In the current research, we present an operation framework and protection mechanism to facilitate se...
This thesis develops a new technique, interaction tracing, to address the security issue of protecti...
Mobile agent security is still a young discipline and most naturally, the focus up to the time of wr...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
We address the security issue of the data which mobile agents gather as they are traversing the Inte...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
With the growing popularity of e-commerce applications that use software agents, the protection of m...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
The mobile agent technology is a new paradigm of distributed computing that can replace the conventi...
Protection of agent data state and partial results in mobile agent systems continues to draw researc...
Abstract. Mobile agent security is still a young discipline and most naturally, the focus up to the ...
Abstract. Mobile agent security is still a young discipline and most naturally, the focus up to the ...
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
In the current research, we present an operation framework and protection mechanism to facilitate se...
This thesis develops a new technique, interaction tracing, to address the security issue of protecti...
Mobile agent security is still a young discipline and most naturally, the focus up to the time of wr...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
We address the security issue of the data which mobile agents gather as they are traversing the Inte...
[[abstract]]For mobile agent, it can only be performed under trusted environment if there is no prop...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
With the growing popularity of e-commerce applications that use software agents, the protection of m...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
The mobile agent technology is a new paradigm of distributed computing that can replace the conventi...
Protection of agent data state and partial results in mobile agent systems continues to draw researc...
Abstract. Mobile agent security is still a young discipline and most naturally, the focus up to the ...
Abstract. Mobile agent security is still a young discipline and most naturally, the focus up to the ...
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
In the current research, we present an operation framework and protection mechanism to facilitate se...
This thesis develops a new technique, interaction tracing, to address the security issue of protecti...
Mobile agent security is still a young discipline and most naturally, the focus up to the time of wr...