Introduction to algorithms
Modern operating systems
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Proceedings of the Second International Workshop on Mobile Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
A Scalable Location Tracking and Message Delivery Scheme for Mobile Agents
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
The Shadow Approach: An Orphan Detection Protocol for Mobile Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Infrastructure for Mobile Agents: Requirements and Design
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Reliable Communication for Highly Mobile Agents
ASAMA '99 Proceedings of the First International Symposium on Agent Systems and Applications Third International Symposium on Mobile Agents
Nomadic Pict: Language and Infrastructure Design for Mobile Agents
ASAMA '99 Proceedings of the First International Symposium on Agent Systems and Applications Third International Symposium on Mobile Agents
Concepts and Architecture of a Security-Centric Mobile Agent Server
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
Mobile objects and agents (MOA)
COOTS'98 Proceedings of the 4th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 4
Locating objects in wide-area systems
IEEE Communications Magazine
Design of a Secure and Decentralized Location Service for Agent Platforms
Agents and Peer-to-Peer Computing
Scalable message routing for mobile software assistants
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Hi-index | 0.00 |
In this paper, we propose a global tracking service for mobile agents, which is scalable to the Internet and accounts for security issues as well as the particularities of mobile agents (frequent changes in locations). The protocols we propose address agent impersonation, malicious location updates, as well as security issues that arise from profiling location servers, and threaten the privacy of agent owners. We also describe the general framework of our tracking service, and some evaluation results of the reference implementation we made.