This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to detect code-tampering attacks made by malicious entities. While describing the security schema, the paper details some scenarios that make the agent vulnerable to malicious attacks. The paper also proposes an extension to the original schema enabling it to cover another security vulnerability in agent operation.Upprättat; 2004; 20080130 (ysko)</p
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
Mobile agents are application design schemes for distributed systems that consist of mobile code ide...
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own...
This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to dete...
The paper describes the evolution and implementation of a self-executing security examination (SENSE...
This paper examines the security vulnerabilities faced by agent communities implemented using agent ...
This paper discusses vulnerabilities of mobile agent based information systems and calls for an incr...
This paper discusses vulnerabilities of mobile agent based information systems and calls for an incr...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
This paper discusses vulnerabilities of mobile agent based information systems and calls for an incr...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agen...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
Mobile agents are application design schemes for distributed systems that consist of mobile code ide...
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own...
This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to dete...
The paper describes the evolution and implementation of a self-executing security examination (SENSE...
This paper examines the security vulnerabilities faced by agent communities implemented using agent ...
This paper discusses vulnerabilities of mobile agent based information systems and calls for an incr...
This paper discusses vulnerabilities of mobile agent based information systems and calls for an incr...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts ...
This paper discusses vulnerabilities of mobile agent based information systems and calls for an incr...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agen...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
Mobile agents are application design schemes for distributed systems that consist of mobile code ide...
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own...