Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Safe kernel extensions without run-time checking
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
IEEE Transactions on Software Engineering
JRes: a resource accounting interface for Java
Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
IEEE Internet Computing
A Flexible Security System for Using Internet Content
IEEE Software
IEEE Internet Computing
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Sliding Encryption: A Cryptographic Tool for Mobile Agents
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
Sumatra: A Language for Resource-Aware Mobile Programs
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Mobile Agent Security and Telescript
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Security in mobile agent systems
Security in mobile agent systems
The Safe-Tcl Security Model
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Certificates for mobile code security
Proceedings of the 2002 ACM symposium on Applied computing
Classification of malicious host threats in mobile agent computing
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Preserving privacy in web services
Proceedings of the 4th international workshop on Web information and data management
ACM Transactions on Internet Technology (TOIT)
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
A Comprehensive Resource Management Framework for Next Generation Wireless Networks
IEEE Transactions on Mobile Computing
Architectural components for the efficient design of mobile agent systems
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
A buddy model of security for mobile agent communities operating in pervasive scenarios
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
The construction of secure mobile agents via evaluating encrypted functions
Web Intelligence and Agent Systems
Ethical design issues in cyberspace
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Autonomous Agents and Multi-Agent Systems
A security protocol for mobile agents based upon the cooperation of sedentary agents
Journal of Network and Computer Applications
JGRIM: An approach for easy gridification of applications
Future Generation Computer Systems
Trust-enhanced secure mobile agent-based system design
International Journal of Agent-Oriented Software Engineering
Security policy for deducting unauthorized IP based mobile host inside the network
EHAC'08 Proceedings of the 7th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Evaluating the security of mobile agent platforms
Autonomous Agents and Multi-Agent Systems
Java-Based Mobile-Agent Systems in the Real World: Security Highlights
Proceedings of the 2005 conference on Self-Organization and Autonomic Informatics (I)
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Secure brokerage mechanisms for mobile electronic commerce
Computer Communications
Dynamic security framework for mobile agent systems: specification, verification and enforcement
International Journal of Information and Computer Security
Study of MA protection technology of extending inheritance hierarchy trees in IDC network management
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
A nested token-based delegation scheme for cascaded delegation in mobile agent environments
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Integrating encrypted mobile agents with smart homes
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Changes of cyber-terrorism: autonomous terrors and counter-measures
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Advanced mobile agent security models for code integrity and malicious availability check
Journal of Network and Computer Applications
Secure multi-agent system for multi-hop environments
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Multi-platform agent systems with dynamic reputation policy management
AI*IA'11 Proceedings of the 12th international conference on Artificial intelligence around man and beyond
An improved execution integrity solution for mobile agents
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Profile-Based security against malicious mobile agents
ADMA'06 Proceedings of the Second international conference on Advanced Data Mining and Applications
Maximizing utility of mobile agent based e-commerce applications with trust enhanced security
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
A survey of security issue in multi-agent systems
Artificial Intelligence Review
A secure protocol for mobile agents in hostile environment
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Communicating mobile processes
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
Research in intrusion detection system based on mobile agent
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
Multiagent driven dynamic clustering of vehicles in VANETs
Journal of Network and Computer Applications
A Social-Feedback Enriched Interface for Software Download
Journal of Organizational and End User Computing
Hi-index | 0.24 |
Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. However, not all applications require the same set of countermeasures, nor can they depend entirely on the agent system to provide them. Instead, countermeasures are applied commensurate with the anticipated threat profile and intended security objectives for the application. While countermeasures typically include any action, device, procedure, technique, or other measure that reduces the vulnerability of or threat to a system, our focus here is specifically on technical mechanisms, as opposed to procedural or non-technical measures. Such countermeasures can be integrated directly into an agent system, or incorporated into the design of an agent to supplement the capabilities of an underlying agent system. This paper gives an overview of the threats associated with software agent systems and their technical countermeasures, including the strengths and weaknesses of the techniques involved. Emphasis is on mobile software agents, since they typically face a more severe set of threats than do static agents and, therefore, demand more rigorous countermeasures.