Among various computational models to accommodate the mobile wireless computing paradigm, the mobile agent model has major technological advantages. Moreover, our research shows that the model has some unique features which, if used appropriately, may support user privacy. We therefore propose a security protocol for mobile agents aiming at user untraceability. We have performed a basic security analysis of the protocol and evaluated its performance. We have also implemented it, made it available to users, and applied it to an e-health service. In this paper, we present an enhanced security study of the protocol. As far as we know, such systematised study has not yet been performed. Additionally, known analyses limit their interest to parti...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
Mobile agents offer a new paradigm for distributed computation, but their potential benefits must be...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
Abstract: In the paper we are concerned with resistance to the traffic analysis for mobile agents. T...
Recently we had proposed two untraceability protocols for mobile agents and began investigating thei...
The mobile agent technology is a new paradigm of distributed computing that can replace the conventi...
We address the security issue of the data which mobile agents gather as they are traversing the Inte...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
A mobile agent is a software which performs an action autonomously and independently as a person or ...
Future computers will be integrated in objects of everyday life. The number of processors in the env...
The paper presents a new security architecture for MAS, which supports anonymity of agent owners. Th...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
Mobile agents offer a new paradigm for distributed computation, but their potential benefits must be...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
Abstract: In the paper we are concerned with resistance to the traffic analysis for mobile agents. T...
Recently we had proposed two untraceability protocols for mobile agents and began investigating thei...
The mobile agent technology is a new paradigm of distributed computing that can replace the conventi...
We address the security issue of the data which mobile agents gather as they are traversing the Inte...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
A mobile agent is a software which performs an action autonomously and independently as a person or ...
Future computers will be integrated in objects of everyday life. The number of processors in the env...
The paper presents a new security architecture for MAS, which supports anonymity of agent owners. Th...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
Mobile agents offer a new paradigm for distributed computation, but their potential benefits must be...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...