Trust has been recognized as an important aspect for mobile agent security. In this paper, we develop a logic based trust model which enables the capturing of a comprehensive set of trust relationships to enhance the security of conventional access control mechanisms in a mobile based applications. We first discuss the notion of trust and its relevance to mobile agent security. Next we define a logic program based language to facilitate the modelling process. To enforce the security related trustworthy behaviours, we then define a set of general rules to capture the semantics. Finally, the language is applied in a mobile agent context to demonstrate how the trust can be explicitly modelled and reasoned about to support better security decis...
Utility has become an important consideration for information security. In this paper, we show that ...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
In many applications, mobile agents are used by a client to delegate a task. This task is usually p...
While offering many practical benefits for distributed applications, mobile agent systems pose some ...
The notion of trust is presented as an important component in a security infrastructure for mobile a...
The mobile agent computing model violates some of the fundamental assumptions of conventional securi...
AbstractMobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobi...
Human activities are increasingly based on the use of remote resources and services, and on the inte...
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we ...
Systems that support mobile agents are increasingly being used on the global Internet. Security conc...
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we ...
This paper describes a security architecture for mobile agent based systems. It defines the notion o...
The mobile agent has been seen as a promising distributed computing technology. The mobility charact...
Abstract. An outstanding security problem in mobile agent systems is resource access control, or aut...
M.Sc.(Computer Science)The dissertation investigates trust and reputation as a specialisation of age...
Utility has become an important consideration for information security. In this paper, we show that ...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
In many applications, mobile agents are used by a client to delegate a task. This task is usually p...
While offering many practical benefits for distributed applications, mobile agent systems pose some ...
The notion of trust is presented as an important component in a security infrastructure for mobile a...
The mobile agent computing model violates some of the fundamental assumptions of conventional securi...
AbstractMobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobi...
Human activities are increasingly based on the use of remote resources and services, and on the inte...
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we ...
Systems that support mobile agents are increasingly being used on the global Internet. Security conc...
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we ...
This paper describes a security architecture for mobile agent based systems. It defines the notion o...
The mobile agent has been seen as a promising distributed computing technology. The mobility charact...
Abstract. An outstanding security problem in mobile agent systems is resource access control, or aut...
M.Sc.(Computer Science)The dissertation investigates trust and reputation as a specialisation of age...
Utility has become an important consideration for information security. In this paper, we show that ...
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure ...
In many applications, mobile agents are used by a client to delegate a task. This task is usually p...