A survey of rollback-recovery protocols in message-passing systems
ACM Computing Surveys (CSUR)
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Performance Evaluation of Mobile Agents for E-commerce Applications
HiPC '01 Proceedings of the 8th International Conference on High Performance Computing
Providing Reliable Agents for Electronic Commerce
TREC '98 Proceedings of the International IFIP/GI Working Conference on Trends in Distributed Systems for Electronic Commerce
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions
ICPADS '97 Proceedings of the 1997 International Conference on Parallel and Distributed Systems
Fault-Tolerant Execution of Mobile Agents
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Modeling Fault-Tolerant Mobile Agent Execution as a Sequence of Agreement Problems
SRDS '00 Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems
Mobile Agent Fault Tolerance for Information Retrieval Applications: An Exception Handling Approach
ISADS '03 Proceedings of the The Sixth International Symposium on Autonomous Decentralized Systems (ISADS'03)
Transparent fault tolerance for parallel applications on networks of workstations
ATEC '96 Proceedings of the 1996 annual conference on USENIX Annual Technical Conference
Recovery model for free-roaming mobile agent against multiple attacks
Proceedings of the 3rd international conference on Mobile multimedia communications
Protecting free-roaming mobile agent against multiple colluded truncation attacks
Proceedings of the 3rd international conference on Mobile multimedia communications
Generating routing table for free roaming mobile agent in distributed environment
Computer Standards & Interfaces
Advanced mobile agent security models for code integrity and malicious availability check
Journal of Network and Computer Applications
iDetect: Content Based Monitoring of Complex Networks using Mobile Agents
Applied Soft Computing
Artificial immune system based mobile agent platform protection
Computer Standards & Interfaces
Efficient service cache management in mobile P2P networks
Future Generation Computer Systems
Hi-index | 0.00 |
In recent years, most of researchers are incorporating the mobile agents in most of the e-service applications especially in e-learning to improve the network latency and to reduce the network traffic. On the other side, the security issues degrade the mobile agent usage. The main intention of the attacker is to kill or modify the behavior of the agent in the middle of the journey to degrade the trustiness of the agent environment. To recover the killed or modified mobile agent in the original form, this paper proposed a novel K-response recovery model. For K-response recovery model, every host dispatching the agent should have the clone to recover the agent and send the response to the preceding host about the agent status (alive). During the recovery of the mobile agent all the components (agent code, itinerary, credential information, collected information and state) are able to recover. The K-response model is experimented for the 1-response scenario and its experimental results proved that the preceding host will get the response with in the time out period of the clone.