Mobile Agent Security and Telescript
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
New security architectural directions for Java
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Mobility and management support for mobile agents (poster)
AGENTS '98 Proceedings of the second international conference on Autonomous agents
A component and communication model for push systems
ESEC/FSE-7 Proceedings of the 7th European software engineering conference held jointly with the 7th ACM SIGSOFT international symposium on Foundations of software engineering
A secure execution framework for Java
Proceedings of the 7th ACM conference on Computer and communications security
Security enhanced mobile agents
Proceedings of the 7th ACM conference on Computer and communications security
Migrating Autonomous Objects in a WAN Environment
Journal of Intelligent Information Systems
Agent-based telematic services and telecom applications
Communications of the ACM
Agent-oriented technology in support of e-business
Communications of the ACM
Secure and efficient mobile agent application reuse using patterns
SSR '01 Proceedings of the 2001 symposium on Software reusability: putting software reuse in context
Mobile agent security with the IPEditor development tool and the mobile UNITY language
Proceedings of the fifth international conference on Autonomous agents
Resource access control in systems of mobile agents
Information and Computation
SOMA: a paradigm to evolve software based on separation of concerns
Proceedings of the International Workshop on Principles of Software Evolution
Core specification and experiments in DIET: a decentralised ecosystem-inspired mobile agent system
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2
A security architecture and design for mobile intelligent agent systems
ACM SIGAPP Applied Computing Review
Preserving privacy in web services
Proceedings of the 4th international workshop on Web information and data management
Software—Practice & Experience - Special issue: Mobile agent systems
Secure Disconnected Agent Interaction for Electronic Commerce Activities Using CapBasED-AMS
Information Technology and Management
Mobile agents with Java: The Aglet API
World Wide Web
Analysis on Extended Ant Routing Algorithms for Network Routing and Management
The Journal of Supercomputing
Design Issues in Mobile-Agent Programming Systems
IEEE Concurrency
The Implementation of Security Algorithm of Mobile Agent on Roblet
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
Internet Agents for Effective Collaboration
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
Dispatching Mobile Agents with Secure Routes in Parallel
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Agent-Based Model of Computer Network Security System: A Case Study
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Evaluating the Security of Three Java-Based Mobile Agent Systems
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Mobile Agent Security - Issues and Directions
IS&N '99 Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market
Authentication for Mobile Agents
Mobile Agents and Security
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
A Mobile Agent Carrier Environment for Mobile Information Retrieval
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
Mobile Agents for Distributed Transactions of a Distributed Heterogeneous Database System
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
Analysis on a Mobile Agent-Based Algorithm for Network Routing and Management
IEEE Transactions on Parallel and Distributed Systems
Configurable Mobile Agent and Its Fault-Tolerance Mechanism
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
Security and robustness enhanced route structures for mobile agents
Mobile Networks and Applications
A mobile agent approach for global database constraint checking
Proceedings of the 2004 ACM symposium on Applied computing
A Mobile Negotiation Agent Embedded Hybrid Online Purchasing System
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Secure Prolog-based mobile code
Theory and Practice of Logic Programming
New analysis on mobile agents based network routing
Design and application of hybrid intelligent systems
Creating an adaptive embedded system by applying multi-agent techniques to reconfigurable hardware
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
ACM Computing Surveys (CSUR)
Mobile Agents for Distributed and Heterogeneous Information Retrieval
Information Retrieval
A secure modular mobile agent system
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems
A review of information security issues and respective research contributions
ACM SIGMIS Database
Using mobile code interfaces to control ubiquitous embedded systems
WOES'99 Proceedings of the Workshop on Embedded Systems on Workshop on Embedded Systems
Expanding and extending the security features of java
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Mobile agent location management in global networks
ICCOMP'05 Proceedings of the 9th WSEAS International Conference on Computers
Distributed agent architecture for packet filtering & monitoring in networked computers
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
SMASH: Modular Security for Mobile Agents
Software Engineering for Multi-Agent Systems V
Java-Based Mobile-Agent Systems in the Real World: Security Highlights
Proceedings of the 2005 conference on Self-Organization and Autonomic Informatics (I)
New analysis on mobile agents based network routing
Applied Soft Computing
International Journal of Wireless and Mobile Computing
Secure multi-agent coordination in a network monitoring system
Software engineering for large-scale multi-agent systems
Design of RBAC-based secure KAgent framework for home network applications
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Security mechanisms for the MAP agent system
EURO-PDP'00 Proceedings of the 8th Euromicro conference on Parallel and distributed processing
Gypsy: a component-based mobile agent system
EURO-PDP'00 Proceedings of the 8th Euromicro conference on Parallel and distributed processing
Security architecture and methodology for authorisation of mobile agents
International Journal of Internet Technology and Secured Transactions
Mobile agent code updating and authentication protocol for code-centric RFID system
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
The k-fault-tolerant checkpointing scheme for the reliable mobile agent system
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Distribution of mobile agents in vulnerable networks
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
The probability of success of mobile agents when routing in faulty networks
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
An agent module for a system on mobile devices
AP2PC'04 Proceedings of the Third international conference on Agents and Peer-to-Peer Computing
Information acquisition through an integrated paradigm: agent + peer-to-peer
AP2PC'03 Proceedings of the Second international conference on Agents and Peer-to-Peer Computing
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Optimal assignment of mobile agents for software authorization and protection
Computer Communications
Countermeasures for mobile agent security
Computer Communications
Statistical behaviors of mobile agents in network routing
The Journal of Supercomputing
Evolution of extensible java EE-Based agent framework
KES-AMSTA'12 Proceedings of the 6th KES international conference on Agent and Multi-Agent Systems: technologies and applications
Hi-index | 0.03 |
Mobile agents offer a new paradigm for distributed computation, but their potential benefits must be weighed against the very real security threats they pose. These threats originate not just in malicious agents but in malicious hosts as well. For example, if there is no mechanism to prevent attacks, a host can implant its own tasks into an agent or modify the agent's state. This can lead in turn to theft of the agent's resources if it has to pay for the execution of tasks, or to loss of the agent's reputation if its state changes from one host to another in ways that alter its behavior in negative ways. Aglets are mobile agents developed at IBM's Tokyo Research Laboratory. The article describes a security model for the Aglets development environment that supports flexible architectural definition of security policies