Communications of the ACM
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Model of Attacks of Malicious Hosts Against Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Reactive Tuple Spaces for Mobile Agent Coordination
MA '98 Proceedings of the Second International Workshop on Mobile Agents
IEEE Communications Magazine
Integrity protection for code-on-demand mobile agents in e-commerce
Journal of Systems and Software
Migration control for mobile agents based on passport and visa
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
Secure web transaction with anonymous mobile agent over internet
Journal of Computer Science and Technology
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Hi-index | 0.00 |
In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malicious agents, agents must be protected from other agents and also agents must be protected from malicious hosts. For solving the first three problems, existing technology from operating systems and distributed systems research can be used. The last problem is new and specific to the mobile agent paradigm and it is much harder to solve. Due to this problem, many say that mobile agents are not ready for the e-commerce systems.In this paper we discuss the security requirements of mobile agents in the context of electronic commerce and analyze how these requirements can be met. We show that, because of the characteristics of e-commerce systems, the security requirements of the agents and their users can be assured in real and open environments as the Internet.