Multi-agent infrastructure, agent discovery , middle agents for Web services and interoperation
Mutli-agents systems and applications
Searching for a black hole in arbitrary networks: optimal mobile agent protocols
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Integrity protection for code-on-demand mobile agents in e-commerce
Journal of Systems and Software
A mobile agent-based active network architecture for intelligent network control
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Composition of Services with Mobile Code
Autonomous Agents and Multi-Agent Systems
Agents in E-commerce: state of the art
Knowledge and Information Systems
Multi-agent Infrastructure, Agent Discovery, Middle Agents for Web Services and Interoperation
EASSS '01 Selected Tutorial Papers from the 9th ECCAI Advanced Course ACAI 2001 and Agent Link's 3rd European Agent Systems Summer School on Multi-Agent Systems and Applications
Infrastructure Issues and Themes for Scalable Multi-Agent Systems
Revised Papers from the International Workshop on Infrastructure for Multi-Agent Systems: Infrastructure for Agents, Multi-Agent Systems, and Scalable Multi-Agent Systems
Active Network Service Management Based on Meta-level Architectures
Proceedings of the 1st OOPSLA Workshop on Reflection and Software Engineering: Reflection and Software Engineering, Papers from OORaSE 1999
A Comprehensive Resource Management Framework for Next Generation Wireless Networks
IEEE Transactions on Mobile Computing
Migration control for mobile agents based on passport and visa
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
Security Mechanisms for Using Mobile Agents in Electronic Commerce
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Security Requirements for Management Systems Using Mobile Agents
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
An agent based adaptive bandwidth allocation scheme for multimedia applications
Journal of Systems and Software - Special issue: Adaptive multimedia computing
Mobile Information Systems
Multicast routing in mobile ad hoc networks by using a multiagent system
Information Sciences: an International Journal
A pairing-based authentication scheme for protecting multiple mobile agent hosts
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Modeling mobile agent behavior
Computers & Mathematics with Applications
Agents Jumping in the Air: Dream or Reality?
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
ODDUGI: Ubiquitous Mobile Agent System
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Black Hole Search with Tokens in Interconnected Networks
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
On Mobile Agents Resistance to Traffic Analysis
Electronic Notes in Theoretical Computer Science (ENTCS)
Efficient key management scheme for hierarchical access control in mobile agents
WSEAS TRANSACTIONS on COMMUNICATIONS
Security in a mobile agent based DDM infrastructure
AIS-ADM'07 Proceedings of the 2nd international conference on Autonomous intelligent systems: agents and data mining
Mobile agent based intrusion detection system adopting hidden Markov model
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
A migration algorithm for moblile agent based on predicted lifetime in MANET
WD'09 Proceedings of the 2nd IFIP conference on Wireless days
Universal connection architecture for interactive applications to achieve distributed computing
Journal of Network and Computer Applications
Security mechanisms for the MAP agent system
EURO-PDP'00 Proceedings of the 8th Euromicro conference on Parallel and distributed processing
Network decontamination with local immunization
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A mobile agents platform: architecture, mobility and security elements
ProMAS'04 Proceedings of the Second international conference on Programming Multi-Agent Systems
A design of the flexible mobile agents based on web
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Black hole search in asynchronous rings using tokens
CIAC'06 Proceedings of the 6th Italian conference on Algorithms and Complexity
MMAS'04 Proceedings of the First international conference on Massively Multi-Agent Systems
Apoptosis and self-destruct: a contribution to autonomic agents?
FAABS'04 Proceedings of the Third international conference on Formal Approaches to Agent-Based Systems
A survey of security issue in multi-agent systems
Artificial Intelligence Review
Black hole search in directed graphs
SIROCCO'09 Proceedings of the 16th international conference on Structural Information and Communication Complexity
Periodic data retrieval problem in rings containing a malicious host
SIROCCO'10 Proceedings of the 17th international conference on Structural Information and Communication Complexity
Applications of agent technology in communications: a review
Computer Communications
Using mobile agents to implement flexible network management strategies
Computer Communications
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
Searching for a black hole in interconnected networks using mobile agents and tokens
Journal of Parallel and Distributed Computing
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Hi-index | 0.25 |
The practicality of mobile agents hinges on realistic security techniques. Mobile agent systems are combination client/servers that transport, and provide an interface with host computers for, mobile agents. Transport of mobile agents takes place between mobile agent systems, which are located on heterogeneous platforms, making up an infrastructure that has the potential to scale to the size of any underlying network. Mobile agents can be rapidly deployed, and can respond to each other and their environment. These abilities expose flaws in current security technology. This article surveys the risks connected with the use of mobile agents, and security techniques available to protect mobile agents and their hosts. The inadequacies of the security techniques developed from the information fortress model are identified. They are the result of using a good model in an inappropriate context (i.e. a closed system model in a globally distributed networking computing base). Problems with commercially available techniques include: (1) conflicts between security techniques protecting hosts and mobile agents, (2) inability to handle multiple collaborative mobile agents, and (3) emphasis on the credentials of software instead of on the integrity of software to determine the level of trust.