Classification of malicious host threats in mobile agent computing
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
ACM Transactions on Internet Technology (TOIT)
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Dynamic security framework for mobile agent systems: specification, verification and enforcement
International Journal of Information and Computer Security
RDyMASS: reliable and dynamic enforcement of security policies for mobile agent systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Trust models and applications in communication and multi-agent systems
International Journal of Knowledge-based and Intelligent Engineering Systems - Selected papers of KES2012-Part 2 of 2
Hi-index | 0.00 |
Mobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms. We develop application security models that capture initial trust relationships and consider their use for mobile agent security.