The active badge location system
ACM Transactions on Information Systems (TOIS)
Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Using code mobility to create ubiquitous and active augmented reality in mobile computing
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The Aware Home: A Living Laboratory for Ubiquitous Computing Research
CoBuild '99 Proceedings of the Second International Workshop on Cooperative Buildings, Integrating Information, Organization, and Architecture
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Hive: Distributed Agents for Networking Things
ASAMA '99 Proceedings of the First International Symposium on Agent Systems and Applications Third International Symposium on Mobile Agents
Mobile Agent Security and Reliability
ISSRE '98 Proceedings of the The Ninth International Symposium on Software Reliability Engineering
AMUN " Autonomic Middleware for Ubiquitous eNvironments Applied to the Smart Doorplate Project
ICAC '04 Proceedings of the First International Conference on Autonomic Computing
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Support of reflective mobile agents in a smart office environment
ARCS'05 Proceedings of the 18th international conference on Architecture of Computing Systems conference on Systems Aspects in Organic and Pervasive Computing
The reflective mobile agent paradigm implemented in a smart office environment
Personal and Ubiquitous Computing
Agents Jumping in the Air: Dream or Reality?
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
Hi-index | 0.00 |
Future computers will be integrated in objects of everyday life. The number of processors in the environment will increase and data will be distributed over different nodes. New classes of information and devices will appear, i.e. data will be catched from environmental sensors and will be used for context extraction. The amount of new devices and services makes an efficient use by centralized systems very difficult.Mobile agents provide an eminent method by virtualizing the user and performing actions on her behalf. They offer a possibility to encapsulate information of a person and her preferences, likings, and habits and perform location-based services of the ubiquitous system in the name of the user. This paper presents a mobile agent system application, where a mobile user-agent follows the user while she moves in the physical space. The user-agent knows personal information and communicates with service-agents in the name of its user to perform special tasks. Because of the personal data security and privacy are major concerns of such an agent system. The paper describes the communication of agents and agent nodes and focuses on the security extensions required by this approach