Seven good reasons for mobile agents
Communications of the ACM
Social trust: a cognitive approach
Trust and deception in virtual societies
Classification of malicious host threats in mobile agent computing
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Design Issues in Mobile-Agent Programming Systems
IEEE Concurrency
Trust in information sources as a source for trust: a fuzzy approach
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
An incentive compatible reputation mechanism
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Why a Cognitive Trustier Performs Better: Simulating Trust-Based Contract Nets
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3
Towards a functional ontology of reputation
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Trust evaluation through relationship analysis
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Trust Enhanced Security for Mobile Agents
CEC '05 Proceedings of the Seventh IEEE International Conference on E-Commerce Technology
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
Autonomous Agents and Multi-Agent Systems
A cloud and agent based architecture design for an educational mobile SNS game
Edutainment'11 Proceedings of the 6th international conference on E-learning and games, edutainment technologies
Hi-index | 0.00 |
This paper proposes an approach to enhancing mobile agent protection. Mobile agents may come under threat from malicious hosts and unscrupulous agents. In an effort to reduce risk for mobile agents and improve the robustness of mobile agent systems - the proposed trust-based approach could be used to augment existing mechanisms aimed at mobile agent protection. The approach involves the development of a component that embeds an intelligent trust evaluation capability in a participating agent. This allows user agents to delegate the task of trust evaluation to specialised evaluator agents. These evaluator agents are a simple add-on to mobile agent systems - eliminating the need to redevelop mobile agent systems.