Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
Crawlets: Agents for High Performance Web Search Engines
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Mobile agent middleware for sensor networks: an application case study
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Hi-index | 0.00 |
Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed to assess agent platform security. These tests focus on malicious agents trying to attack other agents or the agency. Currently, they have been carried out for two agent platforms: JADE and SeMoA. These tests show which of the known theoretical security problems are relevant in practice. Furthermore, they reveal how these problems were addressed by the respective platform and what security flaws are present.