Third International Conference on 3G Mobile Communication Technologies 2002
DOI: 10.1049/cp:20020411
|View full text |Cite
|
Sign up to set email alerts
|

A security architecture for agent-based mobile systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2002
2002
2010
2010

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Secondly, from the mobile agent point of view, it needs to protect the agent from malicious hosts. Therefore, security [4], [5], [6] is a fundamental precondition for the acceptance of mobile agent applications. The system should have a program that actively protects itself against execution environment that possibly may divert the intended execution towards a malicious goal.…”
Section: Drawbacks Of Mobile-agent Based Crawlermentioning
confidence: 99%
“…Secondly, from the mobile agent point of view, it needs to protect the agent from malicious hosts. Therefore, security [4], [5], [6] is a fundamental precondition for the acceptance of mobile agent applications. The system should have a program that actively protects itself against execution environment that possibly may divert the intended execution towards a malicious goal.…”
Section: Drawbacks Of Mobile-agent Based Crawlermentioning
confidence: 99%
“…The scale of vulnerabilities, as shown in Table 3, delineates the research issues at each level of complexity and can be used as a research roadmap to fulfil MAS-specific security requirements of the most complex forms of MAS. **** Table 3 about here **** Agent security requirements for communication channels are equivalent to the normal requirements for confidentiality, integrity, authentication and availability required by a typical software application [4]. Security of communication channels is not included in the MAS-specific security requirements.…”
Section: Agent-specific Vulnerability Levelsmentioning
confidence: 99%
“…This typically means that security enforcement mechanisms have to be retrofitted into a pre-existing design. This approach leads to serious design challenges that usually translate into the emergence of agent-based systems afflicted with security vulnerabilities [4,23].…”
Section: Introductionmentioning
confidence: 99%
“…Over the years, there have been quite a number of researches targeted for agent integrity protection in one way or another. One of the newest active researches is the security architecture by Borselius [18]. While many of the security services are still under active research, the security mechanisms for protecting agents against malicious host is describe in [19].…”
Section: Related Workmentioning
confidence: 99%
“…While the research in [18][19] is actively underway, there are other more mature researches in the area. One of such research work on agent protection is SOMA.…”
Section: Related Workmentioning
confidence: 99%