NOMADS: toward a strong and safe mobile agent system
AGENTS '00 Proceedings of the fourth international conference on Autonomous agents
Security in the Ajanta mobile agent system
Software—Practice & Experience
MARS: A Programmable Coordination Architecture for Mobile Agents
IEEE Internet Computing
IEEE Internet Computing
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Framework to Protect Mobile Agents by Using Reference States
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
A Framework for Tamper Detection Marking of Mobile Applications
ISSRE '03 Proceedings of the 14th International Symposium on Software Reliability Engineering
Countering Security Vulnerabilities in Agent Execution Using a Self Executing Security Examination
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3
Adaptive access control in coordination-based mobile agent systems
Software Engineering for Multi-Agent Systems III
A Property-Dependent Agent Transfer Protocol
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Trusted Computing: Security and Applications
Cryptologia
Foundations of security analysis and design IV
Increasing the resilience of critical SCADA systems using peer-to-peer overlays
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
Protection of SCADA communication channels
Critical Infrastructure Protection
Hi-index | 0.00 |
Applications in mobile multi-agent systems require a high degree of confidence that code that runs inside the system will not be malicious and that any agents which are malicious can be identified and contained. Since the inception of mobile agents, this threat has been addressed using a multitude of techniques, but many of these implementations have only addressed concerns from the position of either the platform or the agent, and very few approaches have undertaken the problem of mobile agent security from both perspectives simultaneously. Furthermore, no middleware exists that facilitates provision of the required security qualities of mobile agent software while extensively focusing on easing the software development burden. In this paper, we introduce a mobile agent system that enhances security functionality by integrating core software and hardware assurance qualities, as well as addressing security concerns from the perspectives of both the platform and the agent.