A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Fault-Tolerant Mobile Agent Execution
IEEE Transactions on Computers
Security Modeling and Evaluation for the Mobile Code Paradigm
ASIAN '99 Proceedings of the 5th Asian Computing Science Conference on Advances in Computing Science
A Model of Attacks of Malicious Hosts Against Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Hi-index | 0.00 |
Providing integrity of execution is considered as the most challenging problem in Mobile Agent System (MAs). Mobile agent watermarking (MAW) is a technique that attempts to provide integrity of execution to a mobile agent. We discuss the attacks against MAW technique and how the security properties for MAs data integrity are fulfilled. We try to model the behavior of a malicious host by launching a series of passive attacks against mobile agent and then see to what extent the security properties for mobile agent can be achieved. The experimental results suggest that MAW framework can be used to protect the computations results of mobile agents