A Formal Architectural Model for Logical Agent Mobility
IEEE Transactions on Software Engineering
Seal: A Framework for Secure Mobile Computations
ICCL'98 Workshop on Internet Programming Languages
Secure Transactions with Mobile Agents in Hostile Environments
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Model of Attacks of Malicious Hosts Against Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Petri Nets as Token Objects: An Introduction to Elementary Object Nets
ICATPN '98 Proceedings of the 19th International Conference on Application and Theory of Petri Nets
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Secure mobile agent environments: modelling role assignments
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
Mobile agent technology has received a big amount of attention throughout recent years because of its salient merits and promising future. But it also brings significant new security problems. Little work has been done to solve these problems through intuitive formal methods. In this paper, we proposed a new formal model of a secure mobile agent system based on Extended Elementary Object System (EEOS) which combines Object Oriented technology with Petri Nets. This model has three hierarchical levels: mobile agent platform level, mobile agent level and security mechanism level. We also proposed a security mechanism -- synchronous firing security mechanism to detect malicious host attack to mobile agent code or execution flow. This paper also discusses how to translate our EEOS model to a coloured Petri Net model supported by Design/CPN and presents the simulation-based analysis of our EEOS model.