Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Mobile agent technology in support of sales order processing in the virtual enterprise
BASYS '98 Proceedings of the 3rd IEEE/IFIP international conference on Intelligent systems for manufacturing : multi-agent systems and virtual organizations: multi-agent systems and virtual organizations
Secure Internet programming
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
An Architecture of Electronic Market Applying Mobile Agent Technology
ISCC '98 Proceedings of the Third IEEE Symposium on Computers & Communications
Hi-index | 0.00 |
Mobile agent has several advantages compared to the traditional client/server architecture. However, a wider use of this technology is currently limited by the lack of a comprehensive security framework, especially for the protection of mobile agents from malicious hosts. This paper presents a protocol that protects a mobile agent against attacks from malicious hosts, for e-commerce applications. Using the reference execution concept, this protocol protects a mobile agent from the alteration of its code, its execution flow, its data and its itinerary.