This thesis develops a new technique, interaction tracing, to address the security issue of protecting mobile agents from potentially malicious hosts. In this technique, a mobile agent is modeled as a black box whose behaviour can be captured through a trace of its inputs and outputs during the process of execution. Formalization of the activity of creating and verifying traces is detailed for a simple agent programming language using operational semantics. An interaction protocol is developed to enable secure exchange of traces between entities in the system that are responsible for verifying the validity of the traces. This protocol is formally modeled and verified for specific security properties using a finite-state model checker. The p...
Abstract. A mobile agent is software which performs an action autonomously and independently as a pe...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
This thesis develops a new technique, interaction tracing, to address the security issue of protecti...
[[abstract]]As a recently emerging distributed computing paradigm, mobile-agent technology attracts ...
The notion of trust is presented as an important component in a security infrastructure for mobile a...
The problem of protecting mobile code from both denial-of-service and state tampering attacks by mal...
Human activities are increasingly based on the use of remote resources and services, and on the inte...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
AbstractSecurity is a very important concept in the growth and the development of the mobile agent t...
The aim of the work presented in this paper is to check cryptographic protocols for mobile agents ag...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
Abstract. A mobile agent is an autonomous agent that is not bound to the system on which it begins e...
Abstract. A mobile agent is software which performs an action autonomously and independently as a pe...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
This thesis develops a new technique, interaction tracing, to address the security issue of protecti...
[[abstract]]As a recently emerging distributed computing paradigm, mobile-agent technology attracts ...
The notion of trust is presented as an important component in a security infrastructure for mobile a...
The problem of protecting mobile code from both denial-of-service and state tampering attacks by mal...
Human activities are increasingly based on the use of remote resources and services, and on the inte...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
AbstractSecurity is a very important concept in the growth and the development of the mobile agent t...
The aim of the work presented in this paper is to check cryptographic protocols for mobile agents ag...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
Abstract. A mobile agent is an autonomous agent that is not bound to the system on which it begins e...
Abstract. A mobile agent is software which performs an action autonomously and independently as a pe...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...