2001
DOI: 10.1007/3-540-45647-3_3
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Security of Three Java-Based Mobile Agent Systems

Abstract: Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution environments. The design and implementation of mechanisms to relocate computations requires a careful assessment of security issues. If these issues are not addressed properly, mobile agent technology cannot be used to implement real-world applications. This paper describes the initial steps of a research effort to design and implement sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2002
2002
2011
2011

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Currently available mobile agent environments are notoriously vulnerable to a variety of security attacks [7], and until such concerns are alleviated mobile agent applications will likely remain purely within the research domain. Nonetheless, there are some circumstances in which mobile agent systems are somewhat sheltered from these concerns.…”
Section: Discussionmentioning
confidence: 99%
“…Currently available mobile agent environments are notoriously vulnerable to a variety of security attacks [7], and until such concerns are alleviated mobile agent applications will likely remain purely within the research domain. Nonetheless, there are some circumstances in which mobile agent systems are somewhat sheltered from these concerns.…”
Section: Discussionmentioning
confidence: 99%
“…An approach very similar to our work was presented in [22]. The authors defined some general attack classes based on an abstract agent system.…”
Section: Testing Agent Platformsmentioning
confidence: 94%
“…The security problem of MA in transmission can be solved with network information protection strategy [5][6] , mature scheme is done at present. Many available method [7][8][9] are presented to protect host and MA execution environment, for example, the authorization of MA, the identity authentication, the access control, etc. However, the most difficult protection problem is MA itself, because the owner of MA will lose control when MA moves to destination MA system, every line code of MA is explained and executed, that is to say, MA is exposed to destination MA system completely.…”
Section: Introductionmentioning
confidence: 99%