Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Mobile agent evolution computing
Information Sciences: an International Journal
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
ACM Transactions on Internet Technology (TOIT)
Auction advisor: an agent-based online-auction decision support system
Decision Support Systems
Secure and auditable agent-based e-marketplace framework for mobile users
Computer Standards & Interfaces
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Mobile Software Agents for Telecommunications
IEEE Communications Magazine
IEEE Communications Magazine
Mobile Agent Application and Integration in Electronic Anamnesis System
Journal of Medical Systems
Hi-index | 0.00 |
Mobile agents have great potential for increasing the realized benefit for a variety of e-commerce applications. However, enabling the mobile agent to safely travel over the open and uncontrollable Internet is necessary to protect the contents of a mobile agent. Recently, many agent structures that manage the keys needed to provide the access control mechanism for mobile agents have been developed. Nevertheless, these structures require either large amount of mobile codes or heavy computation loads. In this paper, a lightweight key management method for hierarchical access control in mobile agent environments is proposed. This method not only provides access control for mobile agents but also reduces the agent size as well as cuts down the computations cost.