Summary Personal Device Assistance (PDA) devices are becoming popular, and some such devices have extended their capability to run a mobile agent platform. This paper describes a new security mechanism for mobile agent platforms running on PDAs. Our security mechanism is based on PDAgentSecurityManager built upon a Java virtual machine environment and provides dynamic authentication and flexible access control. Our security mechanism was implemented and empirically evaluated using an example application. Key words: mobile agent, security, access control In the project described in this paper, we consider a scenario where a large number of users carry a PD
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
Mobile agents (MAs) can support mobile computing by carrying out tasks autonomously for a mobile use...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Abstract. Mobile agent systems provide new perspectives for distributed e-com-merce applications. Th...
This paper describes a security architecture for mobile agent based systems. It defines the notion o...
In today‟s modern era of internet and intranet where distributed networking is spreading out its eff...
The applications of mobile agent technology are various and include electronic commerce, personal as...
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we ...
Abstract: This paper focuses on the development of a hybrid security model for Mobile Agents (MAs) s...
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we ...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
Mobile agents are often described as a promising technology moving towards the vision of a widely di...
Mobile agents (MAs) can support mobile computing by carrying out tasks autonomously for a mobile use...
A mobile agent is a software which performs an action autonomously and independently as a person or ...
Mobile agents have been proposed for key applications such as forensics analysis, intrusion detectio...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
Mobile agents (MAs) can support mobile computing by carrying out tasks autonomously for a mobile use...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Abstract. Mobile agent systems provide new perspectives for distributed e-com-merce applications. Th...
This paper describes a security architecture for mobile agent based systems. It defines the notion o...
In today‟s modern era of internet and intranet where distributed networking is spreading out its eff...
The applications of mobile agent technology are various and include electronic commerce, personal as...
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we ...
Abstract: This paper focuses on the development of a hybrid security model for Mobile Agents (MAs) s...
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we ...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
Mobile agents are often described as a promising technology moving towards the vision of a widely di...
Mobile agents (MAs) can support mobile computing by carrying out tasks autonomously for a mobile use...
A mobile agent is a software which performs an action autonomously and independently as a person or ...
Mobile agents have been proposed for key applications such as forensics analysis, intrusion detectio...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
Mobile agents (MAs) can support mobile computing by carrying out tasks autonomously for a mobile use...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...