With the rapid proliferation of software agents, there comes an increased need for agents to ensure that they do not provide data and/or services to unauthorized users. We first develop an abstract definition of what it means for an agent to preserve data/action security. Most often, this requires an agent to have knowledge that is impossible to acquire --- hence, we then develop approximate security checks that take into account, the fact that an agent usually has incomplete/approximate beliefs about other agents. We develop two types of security checks --- static ones that can be checked prior to deploying the agent, and dynamic ones that are executed at run time. We prove that a number of these problems are undecidable, but...
Mobile agents are active objects that can autonomously migrate in a network to perform tasks on beha...
The paper describes the evolution and implementation of a self-executing security examination (SENSE...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Mobile agent systems have a multitude of applications in areas such as network management systems, t...
In this paper we propose how to solve information security and privacy using agents. We discus unsec...
Agents are promising software building blocks to create open information and distributed systems. To...
Software agents are increasingly used to handle the information of individuals and companies. They a...
AbstractSecurity is a very important concept in the growth and the development of the mobile agent t...
The introduction of agent technology raises several security issues that are beyond conventional sec...
This paper exposes different security threats posed to information in software agent systems. It des...
Agents were designed to collaborate and share information. While highly desirable for interoperabili...
Ph.D.Many organisations are starting to make large parts of their information resources publicly acc...
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own...
Software agents, as the main body of agent-oriented E-commerce systems, have a great potential for E...
Abstract: "When large Multi Agent Systems operate over open platforms such as the Internet, there is...
Mobile agents are active objects that can autonomously migrate in a network to perform tasks on beha...
The paper describes the evolution and implementation of a self-executing security examination (SENSE...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Mobile agent systems have a multitude of applications in areas such as network management systems, t...
In this paper we propose how to solve information security and privacy using agents. We discus unsec...
Agents are promising software building blocks to create open information and distributed systems. To...
Software agents are increasingly used to handle the information of individuals and companies. They a...
AbstractSecurity is a very important concept in the growth and the development of the mobile agent t...
The introduction of agent technology raises several security issues that are beyond conventional sec...
This paper exposes different security threats posed to information in software agent systems. It des...
Agents were designed to collaborate and share information. While highly desirable for interoperabili...
Ph.D.Many organisations are starting to make large parts of their information resources publicly acc...
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own...
Software agents, as the main body of agent-oriented E-commerce systems, have a great potential for E...
Abstract: "When large Multi Agent Systems operate over open platforms such as the Internet, there is...
Mobile agents are active objects that can autonomously migrate in a network to perform tasks on beha...
The paper describes the evolution and implementation of a self-executing security examination (SENSE...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...