Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Seven good reasons for mobile agents
Communications of the ACM
Security in the Ajanta mobile agent system
Software—Practice & Experience
Mobile agent security with the IPEditor development tool and the mobile UNITY language
Proceedings of the fifth international conference on Autonomous agents
A Model of Attacks of Malicious Hosts Against Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Simplifying Mobile Agent Development through Reactive Mobility by Failure
SBIA '02 Proceedings of the 16th Brazilian Symposium on Artificial Intelligence: Advances in Artificial Intelligence
Agent System Development Method Based on Agent Patterns
ISADS '99 Proceedings of the The Fourth International Symposium on Autonomous Decentralized Systems
A configurable mobile agent data protection protocol
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Brute force web search for wireless devices using mobile agents
Journal of Systems and Software
An approach to modelling and applying mobile agent design patterns
ACM SIGSOFT Software Engineering Notes
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
Analysis of a Free Roaming Agent Result-Truncation Defense Scheme
CEC '04 Proceedings of the IEEE International Conference on E-Commerce Technology
A pattern-based development tool for mobile agents
Proceedings of the 36th SIGCSE technical symposium on Computer science education
A security protocol for mobile agents based upon the cooperation of sedentary agents
Journal of Network and Computer Applications
Mobile agents for information retrieval in hybrid simulation environment
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Comparison and Performance Evaluation of Mobile Agent Platforms
ICAS '07 Proceedings of the Third International Conference on Autonomic and Autonomous Systems
Requirements for Evaluating Architectural Stability
AICCSA '06 Proceedings of the IEEE International Conference on Computer Systems and Applications
Securing dynamic itineraries for mobile agent applications
Journal of Network and Computer Applications
A mobile agent platform for distributed network and systems management
Journal of Systems and Software
Protecting mobile agents from external replay attacks
Journal of Systems and Software
Towards the automatic generation of mobile agents for distributed intrusion detection system
Journal of Systems and Software
iDetect: Content Based Monitoring of Complex Networks using Mobile Agents
Applied Soft Computing
A Mobile Agent Approach for Secure Integrated Medical Information Systems
Journal of Medical Systems
Hi-index | 0.00 |
In this paper, we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile agent security have unblocked this technology, but there is still one important issue to overcome: the complexity of programming applications using these security solutions. Our proposal aims to facilitate and speed up the process of implementing cryptographic protocols, and to allow the reuse of these protocols for the development of secure mobile agents. As a result, the proposed architecture and development environment promote the use of mobile agent technology for the implementation of secure distributed applications.