Cryptographic support for fault-tolerant distributed computing
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Protecting the Itinerary of Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Sliding Encryption: A Cryptographic Tool for Mobile Agents
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Mobile Agents: Are They a Good Idea?
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
A Framework to Protect Mobile Agents by Using Reference States
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Trusting trusted hardware: towards a formal model for programmable secure coprocessors
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Countermeasures for mobile agent security
Computer Communications
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
CycleMeter: detecting fraudulent peers in internet cycle sharing
Proceedings of the 2006 ACM/IEEE conference on Supercomputing
Boosting-Based Distributed and Adaptive Security-Monitoring through Agent Collaboration
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
A hybrid method for protecting the integrity of mobile agents
TELE-INFO'08 Proceedings of the 7th WSEAS International Conference on Telecommunications and Informatics
An Agent Based Multifactor Biometric Security System
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III
Host-Based Security Challenges and Controls: A Survey of Contemporary Research
Information Security Journal: A Global Perspective
Enforcing security in the AgentScape middleware
Proceedings of the 2008 workshop on Middleware security
A Specialised Architecture for Embedding Trust Evaluation Capabilities in Intelligent Mobile Agents
Agent Computing and Multi-Agent Systems
Protecting mobile-agent data collection against blocking attacks
Computer Standards & Interfaces
Application Security Models for Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Enforcing integrity of agent migration paths by distribution of trust
International Journal of Intelligent Information and Database Systems
Integrating the Havana agent platform into the existing web infrastructure
International Journal of Wireless and Mobile Computing
MOC via TOC using a mobile agent framework
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
A secure protocol for mobile agents in hostile environment
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Hybrid approach for secure mobile agent computations
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
A Study on Agent-Based Secure Scheme for Electronic Medical Record System
Journal of Medical Systems
Countermeasure graphs for software security risk assessment: An action research
Journal of Systems and Software
Hi-index | 0.00 |
Full-scale adoption of mobile agent technology in untrustworthy network environments, such as the Internet, has been delayed by several security complexities [Montanari, 2001]. Presently, there is a large array of security issues and sub-issues within mobile agent computing that makes it tough to distinguish between different types of problems, and therefore also interfere with the definition of suitable solutions. Literature addressing the full range of problems is limited and mostly discusses single security threats or subsets of security problems and their possible solutions. The purpose of this paper is to analyse the different security threats that can possibly be imposed on agents by malicious hosts, and then provide a classification of these threats before we describe the current solution approaches that are implemented to address the identified problems. By providing such a classification we were able to identify specific gaps in current research efforts, and enable researchers to systematically focus their attention on different classes of solutions to remedy these threats.