Designing distributed applications with mobile code paradigms
ICSE '97 Proceedings of the 19th international conference on Software engineering
IEEE Transactions on Software Engineering
Xor-trees for efficient anonymous multicast and reception
ACM Transactions on Information and System Security (TISSEC)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
IEEE Concurrency
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Is it an Agent, or Just a Program?: A Taxonomy for Autonomous Agents
ECAI '96 Proceedings of the Workshop on Intelligent Agents III, Agent Theories, Architectures, and Languages
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Mobile Agents: Motivations and State-of-the-Art Systems
Mobile Agents: Motivations and State-of-the-Art Systems
Untraceability of mobile agents
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Anonymity and information hiding in multiagent systems
Journal of Computer Security
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
The paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the elements of the second module. This part of architecture was implemented and provided to MAS users. Module II instead, is defined in abstract way, through high-level description of its components.