Classification of malicious host threats in mobile agent computing
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Design Issues in Mobile-Agent Programming Systems
IEEE Concurrency
Fault-Tolerant Mobile Agent Execution
IEEE Transactions on Computers
ACM Transactions on Internet Technology (TOIT)
Defenses against the Truncation of Computation Results of Free-Roaming Agents
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
On Certificate Revocation and Validation
FC '98 Proceedings of the Second International Conference on Financial Cryptography
An Approach for Providing Mobile Agent Fault Tolerance
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces
ASA/MA 2000 Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents
Fault-Tolerant Execution of Mobile Agents
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Fault-Tolerant Mobile Agents in Distributed Objects Systems
FTDCS '03 Proceedings of the The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems
A Fault-Tolerant Protocol for Providing the Exactly-Once Property of Mobile Agents
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Efficient migration for mobile computing in distributed networks
Computer Standards & Interfaces
Hi-index | 0.00 |
Full-scale adoption of mobile agent technology in untrustworthy network environment, such as Internet, has been delayed due to several security complexities. The protection of mobile agents against the attacks of malicious hosts is considered a very challenging security problem. It has inspired lot of research interest, but very few measures exist to counter blocking attack where a host with malicious intentions refuses to transmit a mobile agent to the next host. It becomes an important requirement for the agent owner to rescue the data collected by the agent under custody and redeem a loss. In this paper, we present two schemes that rescue the offering results from a malicious host's blocking attack, and make a comparison of their performance from several aspects. Our approach has two new features that previous protocols lack. It allows the proper handling of time-sensitive offers and supports the gradual decision-making execution.