1998
DOI: 10.1007/3-540-49255-0_77
|View full text |Cite
|
Sign up to set email alerts
|

A Model of Attacks of Malicious Hosts Against Mobile Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2000
2000
2010
2010

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(18 citation statements)
references
References 0 publications
0
18
0
Order By: Relevance
“…The proposed solutions include the use of cooperative agents (Roth, 1998;Ouardani et al, 2007), cryptographic tracing (Vigna, 1997), obfuscated code (Hohl, 1998), secure coprocessors (Yee, 1994), protection of the computational results (Maggi and Sisto, 2003), or cryptographic protection of itineraries (Mir and Borrell, 2003).…”
Section: Mobile Agent Securitymentioning
confidence: 99%
“…The proposed solutions include the use of cooperative agents (Roth, 1998;Ouardani et al, 2007), cryptographic tracing (Vigna, 1997), obfuscated code (Hohl, 1998), secure coprocessors (Yee, 1994), protection of the computational results (Maggi and Sisto, 2003), or cryptographic protection of itineraries (Mir and Borrell, 2003).…”
Section: Mobile Agent Securitymentioning
confidence: 99%
“…In fact, protecting an agent from "host attacks" (i.e., harmful items stored at the visited site) has become a pressing security concern (e.g., see [5,11,13,15,17,18,20]). Still, this problem has not been taken into account so far by any of the existing solutions.…”
Section: Mobile Agents and Black Holementioning
confidence: 99%
“…Nevertheless, security is one of the blocking factors of the development of these systems. The main unsolved security problem lies on the possible existence of malicious hosts that can manipulate the execution and data of agents [5].…”
Section: Introductionmentioning
confidence: 99%