The introduction of agent technology raises several security issues that are beyond conventional security mechanisms capability and considerations, but research in protecting the agent from malicious host attack is evolving. This research proposes two approaches to protecting an agent from being attacked by a malicious host. The first approach consists of an obfuscation algorithm that is able to protect the confidentiality of an agent and make it more difficult for a malicious host to spy on the agent. The algorithm uses multiple polynomial functions with multiple random inputs to convert an agent's critical data to a value that is meaningless to the malicious host. The effectiveness of the obfuscation algorithm is enhanced by addition of n...
Abstract—The paper presents selected security aspects related to confidentiality, privacy, trust and...
Abstract: "When large Multi Agent Systems operate over open platforms such as the Internet, there is...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
The introduction of agent technology raises several security issues that are beyond conventional sec...
With the advent of agent technology, the need for security of applications becomes a concern that is...
ii Mobile agents are autonomous programs that roam the Internet from machine to machine under their ...
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own...
Mobile agents are software entities consisting of code, data and state that can migrate autonomously...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Abstract — This research identifies and analyzes ways that ensure the secure operation of a multi-ag...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agen...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
Agent communication security has been a subject of much research in the recent past motivated by the...
As agent technology is expected to become a possible base platform for an electronic services framew...
Abstract—The paper presents selected security aspects related to confidentiality, privacy, trust and...
Abstract: "When large Multi Agent Systems operate over open platforms such as the Internet, there is...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...
The introduction of agent technology raises several security issues that are beyond conventional sec...
With the advent of agent technology, the need for security of applications becomes a concern that is...
ii Mobile agents are autonomous programs that roam the Internet from machine to machine under their ...
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own...
Mobile agents are software entities consisting of code, data and state that can migrate autonomously...
New techniques,languages and paradigms have facilitated the creation of distributed applications in ...
Abstract — This research identifies and analyzes ways that ensure the secure operation of a multi-ag...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agen...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
Agent communication security has been a subject of much research in the recent past motivated by the...
As agent technology is expected to become a possible base platform for an electronic services framew...
Abstract—The paper presents selected security aspects related to confidentiality, privacy, trust and...
Abstract: "When large Multi Agent Systems operate over open platforms such as the Internet, there is...
Abstract: In the current research, we present an operation framework and protection mechanism to fac...