Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious agents are extensively being tackled. We concentrate on the reverse problem, namely how a mobile agent can be protected from malicious behaviour of the execution environment, which is largely ignored. We will identify the problem of trust as the major issue in this context and describe a trusted and tamper-proof hardware that can be used to divide this problem among several principals, each of which has to be trusted with a special task. We show that the presented approach can be used to mitigate an important problem in the design of open systems
In the current research, we present an operation framework and protection mechanism to facilitate se...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Mobile agents are software entities consisting of code, data, and state that can migrate autonomousl...
The problem of protecting an execution environment from possibly malicious mobile agents has been st...
Systems that support mobile agents are increasingly being used on the global Internet. An important ...
While offering many practical benefits for distributed applications, mobile agent systems pose some ...
The mobile agent has been seen as a promising distributed computing technology. The mobility charact...
Mobile Agents are potential candidates for handling applications that are not locate specific. One s...
Systems that support mobile agents are increasingly being used on the global Internet. An important ...
Human activities are increasingly based on the use of remote resources and services, and on the inte...
The mobile agent computing model violates some of the fundamental assumptions of conventional securi...
Although mobile agents are a promising technology, the large-scale deployment of agents and the exis...
The notion of trust is presented as an important component in a security infrastructure for mobile a...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and hetero...
In the current research, we present an operation framework and protection mechanism to facilitate se...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Mobile agents are software entities consisting of code, data, and state that can migrate autonomousl...
The problem of protecting an execution environment from possibly malicious mobile agents has been st...
Systems that support mobile agents are increasingly being used on the global Internet. An important ...
While offering many practical benefits for distributed applications, mobile agent systems pose some ...
The mobile agent has been seen as a promising distributed computing technology. The mobility charact...
Mobile Agents are potential candidates for handling applications that are not locate specific. One s...
Systems that support mobile agents are increasingly being used on the global Internet. An important ...
Human activities are increasingly based on the use of remote resources and services, and on the inte...
The mobile agent computing model violates some of the fundamental assumptions of conventional securi...
Although mobile agents are a promising technology, the large-scale deployment of agents and the exis...
The notion of trust is presented as an important component in a security infrastructure for mobile a...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and hetero...
In the current research, we present an operation framework and protection mechanism to facilitate se...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Mobile agents are software entities consisting of code, data, and state that can migrate autonomousl...