[[abstract]]As a recently emerging distributed computing paradigm, mobile-agent technology attracts great interests because of its salient merits. However, it also brings significant security concerns, among which the security problems between a mobile agent and its platforms are of primary importance. While protecting a platform (platform or host security) can benefit from the security measures in a traditional client-server system, protecting a mobile agent (mobile-agent or code security) has not been met in traditional client-server systems and is a new area emerging with mobile-agent technology. Mobile-agent security is also believed to be the most difficult in the security areas of a mobile-agent system. Several methods are proposed to...
Abstract. A mobile agent is software which performs an action autonomously and independently as a pe...
Abstract: Mobility induces new challenges for dynamic systems, which need a new conceptional treatme...
Abstract. Mobile agents as network computing technology has been applied to solve various parallel a...
Security modeling for agents has been one of the most challenging issues in developing practical mob...
Mobile agents are application design schemes for distributed systems that consist of mobile code ide...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
A mobile agent is a software which performs an action autonomously and independently as a person or ...
The mobile agent technology is a new paradigm of distributed computing that can replace the conventi...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
The mobile agent has been seen as a promising distributed computing technology. The mobility charact...
This thesis develops a new technique, interaction tracing, to address the security issue of protecti...
Mobile agents have been proposed for key applications such as forensics analysis, intrusion detectio...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
Abstract. A mobile agent is software which performs an action autonomously and independently as a pe...
Abstract: Mobility induces new challenges for dynamic systems, which need a new conceptional treatme...
Abstract. Mobile agents as network computing technology has been applied to solve various parallel a...
Security modeling for agents has been one of the most challenging issues in developing practical mob...
Mobile agents are application design schemes for distributed systems that consist of mobile code ide...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
A mobile agent is a software which performs an action autonomously and independently as a person or ...
The mobile agent technology is a new paradigm of distributed computing that can replace the conventi...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
The mobile agent has been seen as a promising distributed computing technology. The mobility charact...
This thesis develops a new technique, interaction tracing, to address the security issue of protecti...
Mobile agents have been proposed for key applications such as forensics analysis, intrusion detectio...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
Abstract. A mobile agent is software which performs an action autonomously and independently as a pe...
Abstract: Mobility induces new challenges for dynamic systems, which need a new conceptional treatme...
Abstract. Mobile agents as network computing technology has been applied to solve various parallel a...