Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Mobile Search for a Black Hole in an Anonymous Ring
DISC '01 Proceedings of the 15th International Conference on Distributed Computing
Adaptive Migration Strategy for Mobile Agents on Internet
TES '01 Proceedings of the Second International Workshop on Technologies for E-Services
Active security management based on secure zone cooperation
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
A trust model for distributed systems based on reputation
International Journal of Web and Grid Services
Design of secure monitor in the secure zone cooperation
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
PATROL: a comprehensive reputation-based trust model
International Journal of Internet Technology and Secured Transactions
Information Sciences: an International Journal
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
Hi-index | 0.00 |
In the world of mobile agents, security aspects areextensively being discussed. Denial of service (DoS) attacks are of considerable interest, i.e., when malicioushosts either delete received agents or prevent them fromcontinuing their route. This paper presents a methodfor a posteriori identification of such malicious hosts tobuild a trust policy. Depending on how much the agentowner trusts the hosts, he can either define an appropriate order in which selected hosts should be visited, orhe can decide which hosts he does not want to contactagain. We also show how the sequence of hosts shouldbe determined in order to minimize some costs.