On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
A configurable mobile agent data protection protocol
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
ACM Computing Surveys (CSUR)
Protecting free-roaming mobile agent against multiple colluded truncation attacks
Proceedings of the 3rd international conference on Mobile multimedia communications
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Free-roaming mobile agent (FRoMA) protection against multiple attacks
International Journal of Communication Networks and Distributed Systems
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Hi-index | 0.00 |
The Mobile Agent (MA) paradigm seems to be a promising technology for developing applications in open, distributed and heterogeneous environments, such as the Internet. Mobile agents can overcome some of the limits of the traditional Client/Server model and can easily integrate with the web to improve application accessibility. Many application areas, such as electronic commerce, mobile computing, network management and information retrieval can benefit from the application of the MA technology. However, a wider diffusion of MA is currently limited by the lack of a comprehensive security framework. Answering to the requirement of protection for both execution sites and mobile agents can boost the acceptance of the MA paradigm in the Internet environment.This paper describes an MA environment, called Secure and Open Mobile Agent (SOMA), that is based on a thorough security model and provides a wide range of tools and mechanisms to build and enforce flexible security policies. In particular, we focus on the problem of how mobile agents can be protected from malicious behavior of execution sites and we propose a distributed multiple-hops integrity protocol for mobile agent protection, fully integrated in SOMA.