A survey of process migration mechanisms
ACM SIGOPS Operating Systems Review
Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Safe kernel extensions without run-time checking
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
Agent sourcebook
IEEE Transactions on Software Engineering
JRes: a resource accounting interface for Java
Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
IEEE Internet Computing
A Flexible Security System for Using Internet Content
IEEE Software
IEEE Internet Computing
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Sliding Encryption: A Cryptographic Tool for Mobile Agents
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
Sumatra: A Language for Resource-Aware Mobile Programs
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Mobile Agent Security and Telescript
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Security in mobile agent systems
Security in mobile agent systems
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
ACM Transactions on Internet Technology (TOIT)
An Intrusion Detection System for Aglets
MA '02 Proceedings of the 6th International Conference on Mobile Agents
aZIMAS: Web Mobile Agent System
MA '02 Proceedings of the 6th International Conference on Mobile Agents
A Model for Mobile Code Using Interacting Automata
IEEE Transactions on Mobile Computing
The construction of secure mobile agents via evaluating encrypted functions
Web Intelligence and Agent Systems
Mobile Code Paradigms and Security Issues
IEEE Internet Computing
Secure agent computation: X.509 proxy certificates in a multi-lingual agent framework
Journal of Systems and Software - Special issue: Software engineering education and training
A security protocol for mobile agents based upon the cooperation of sedentary agents
Journal of Network and Computer Applications
An Agent-based Resource Allocation Model for computational grids
Multiagent and Grid Systems
Secure mobile agent system and its application in the trust building process of virtual enterprises
Multiagent and Grid Systems
On agent technology for e-commerce: trust, security and legal issues
The Knowledge Engineering Review
Securing dynamic itineraries for mobile agent applications
Journal of Network and Computer Applications
Two executable mobility design patterns: mfold and mmap
Proceedings of the 2006 conference on Pattern languages of programs
Anonymity Architecture for Mobile Agent Systems
HoloMAS '07 Proceedings of the 3rd international conference on Industrial Applications of Holonic and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing
Non-repudiation Mechanism of Agent-Based Mobile Payment Systems: Perspectives on Wireless PKI
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Agent mobility architecture based on IEEE-FIPA standards
Computer Communications
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Secure brokerage mechanisms for mobile electronic commerce
Computer Communications
Efficient key management scheme for hierarchical access control in mobile agents
WSEAS TRANSACTIONS on COMMUNICATIONS
Outdoor distributed computing with split smart messages
Proceedings of the 12th Monterey conference on Reliable systems on unreliable networked platforms
Communication security in multi-agent systems
CEEMAS'03 Proceedings of the 3rd Central and Eastern European conference on Multi-agent systems
An agent-based framework for inhabitants' untraceability in ubiquitous environments
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
MagicNET: secure communication methodology for mobile agents
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents
Computer Communications
A secure migration process for mobile agents
Software—Practice & Experience
DualTrust: a distributed trust model for swarm-based autonomic computing systems
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Multi-platform agent systems with dynamic reputation policy management
AI*IA'11 Proceedings of the 12th international conference on Artificial intelligence around man and beyond
A secure migration mechanism of mobile agents under mobile agent environments
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Evaluating mobile agent platform security
MATES'06 Proceedings of the 4th German conference on Multiagent System Technologies
Hybrid approach for secure mobile agent computations
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Communicating mobile processes
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
Correlation in distributed intrusion detection system using mobile agent
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Securing mobile agents for crisis management support
Proceedings of the seventh ACM workshop on Scalable trusted computing
Multiagent driven dynamic clustering of vehicles in VANETs
Journal of Network and Computer Applications
Aspect-Oriented design and implementation of secure agent communication system
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
International Journal of Strategic Information Technology and Applications
Hi-index | 0.00 |
Mobile agent technology offers a new computing paradigm in which aprogram, in the form of a software agent, can suspend its execution on a host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new host. The use of mobile code has a long history dating back to the use of remote job entry systems in the 1960's. Today's agent incarnations can be characterized in a number of ways ranging from simple distributed objects to highly organized software with embedded intelligence. As the sophistication of mobile software has increased over time, so too have the associated threats to security. This report provides an overview of the range of threats facing the designers of agent platforms and the developers of agent-based applications. The report also identifies generic security objectives, and a range of measures for countering the identified threats and fulfilling these security objectives.