Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Security in the Ajanta mobile agent system
Software—Practice & Experience
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Model of Attacks of Malicious Hosts Against Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Toward Interoperability of Mobile-Agent Systems
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Secure Integration of Distributed Medical Data Using Mobile Agents
IEEE Intelligent Systems
Securing dynamic itineraries for mobile agent applications
Journal of Network and Computer Applications
Component-Based Development of Secure Mobile Agents Applications
CEEMAS '07 Proceedings of the 5th international Central and Eastern European conference on Multi-Agent Systems and Applications V
Protecting mobile agents from external replay attacks
Journal of Systems and Software
E-health Services with Secure Mobile Agent
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Providing early resource allocation during emergencies: The mobile triage tag
Journal of Network and Computer Applications
Promoting the development of secure mobile agent applications
Journal of Systems and Software
Domino: exploring mobile collaborative software adaptation
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Enabling mobile agents interoperability through FIPA standards
CIA'06 Proceedings of the 10th international conference on Cooperative Information Agents
Hi-index | 0.00 |
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a major issue. In our scheme, agents protect their code and data by carrying their own protection mechanisms. This approach improves traditional solutions, where protection was managed by the platform. The implementation is far from trivial. We have implemented this scheme in the JADE framework, using Java. Any application using mobile agents can incorporate these mechanisms to implement agent protection with a minimum impact in the its existing code base.