This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts in mobile code scenarios. In this security paradigm, a spy agent, i.e. a mobile agent which circulates amongst a number of remote hosts, can employ a variety of techniques in order to both appear 'normal' and suggest to a malicious host that it can 'misuse' the agent's data or code without being held accountable. A framework for the operation and deployment of such spy agents is described. Subsequently, a number of aspects of the operation of such agents within this framework are analysed in greater detail. The set of spy agent routes needs to be constructed in a manner that enables hosts to be identified from a set of detectable agent...
The introduction of agent technology raises several security issues that are beyond conventional sec...
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile...
This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to dete...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agen...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
Abstract — This research identifies and analyzes ways that ensure the secure operation of a multi-ag...
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own...
Among various computational models to accommodate the mobile wireless computing paradigm, the mobile...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
The introduction of agent technology raises several security issues that are beyond conventional sec...
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile...
This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to dete...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agen...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
An increasingly promising and widespread topic of research in distributed computing is the mobile ag...
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transpor...
Abstract — This research identifies and analyzes ways that ensure the secure operation of a multi-ag...
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own...
Among various computational models to accommodate the mobile wireless computing paradigm, the mobile...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
The introduction of agent technology raises several security issues that are beyond conventional sec...
Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile...
This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to dete...