Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Integrity protection for code-on-demand mobile agents in e-commerce
Journal of Systems and Software
Performance Evaluation of Mobile Agents for E-commerce Applications
HiPC '01 Proceedings of the 8th International Conference on High Performance Computing
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
Cryptographic Security for Mobile Code
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Verifiable distributed oblivious transfer and mobile agent security
DIALM-POMC '03 Proceedings of the 2003 joint workshop on Foundations of mobile computing
Secure Integration of Distributed Medical Data Using Mobile Agents
IEEE Intelligent Systems
A Test Suite for the Evaluation of Mobile Agent Platform Security
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Recovery model for free-roaming mobile agent against multiple attacks
Proceedings of the 3rd international conference on Mobile multimedia communications
ICETET '08 Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology
Key Distribution Framework for a Mobile Agent Platform
NGMAST '08 Proceedings of the 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies
Performance analysis of mobile agent failure recovery in e-service applications
Computer Standards & Interfaces
Countermeasures for mobile agent security
Computer Communications
Artificial immune system based mobile agent platform protection
Computer Standards & Interfaces
Efficient service cache management in mobile P2P networks
Future Generation Computer Systems
Self-reliant mobile code: a new direction of agent security
Journal of Network and Computer Applications
Hi-index | 0.02 |
Mobile agent technology is an emerging paradigm in distributed computing environment and it holds a potential status in the relevant research field due to its unique capabilities like flexibility, dynamic customization and robust interaction in unreliable networks. But the limited security perspectives and shortfalls of the mobile agent environments degrade its usage in a variety of application domains. Even though some of the protection models are available for protecting the environments, they are not efficient in handling the security issues. To make the mobile agent environment secure, this paper proposed advanced models to improve the efficiency of the existing Malicious Identification Police model for scanning the incoming agent to detect the malicious activities and to overcome the availability of vulnerabilities in the existing Root Canal algorithm for code integrity checks. The MIP model is extended with the policy to differentiate the agent owners in the distributed environment and the Root Canal algorithm is improved as eXtended Root Canal algorithm. The experimental results of the advanced models show that though these mechanisms take more time complexity than the existing malicious identification police model and Root Canal model, these models are efficient in protecting the agent code integrity and scanning the agent for malicious activities. Also the new models possess less time complexity compared to the other related existing models in the secure mobile agent environment.