Agent design patterns: elements of agent application design
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Agent system development method based on agent patterns
Proceedings of the 21st international conference on Software engineering
Coordinating Patterns of Mobile Information Agents
CIA '98 Proceedings of the Second International Workshop on Cooperative Information Agents II, Learning, Mobility and Electronic Commerce for Information Discovery on the Internet
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Authentication for Mobile Agents
Mobile Agents and Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Safe, Untrusted Agents Using Proof-Carrying Code
Mobile Agents and Security
Hi-index | 0.00 |
In view of the proliferation and expansion of wide-area open networks such as the intranets and extra-nets, agent technology is attracting greater attention. However, as yet there is well-established and widely used method of developing safe and secure agent systems. In this paper, we propose a methodology that supports the step-by-step development of mobile agent systems while ensuring consideration of security issues. This approach results in a robust infrastructure for practical system development, and by supporting calculation of various costs allows efficiency and security tradeoffs to be objectively evaluated.