1999
DOI: 10.1007/3-540-47790-x_7
|View full text |Cite
|
Sign up to set email alerts
|

Methods for Protecting a Mobile Agent’s Route

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2001
2001
2011
2011

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…In [4,5] Westhoffet describe methods for the protection of the agent's route against hosts spying out route information. One technique for ensuring that a mobile agent arrives safely at its destination is through the use of replication and voting [7].…”
Section: Related Workmentioning
confidence: 99%
“…In [4,5] Westhoffet describe methods for the protection of the agent's route against hosts spying out route information. One technique for ensuring that a mobile agent arrives safely at its destination is through the use of replication and voting [7].…”
Section: Related Workmentioning
confidence: 99%
“…In [3,4] Westhoffet al describe methods for the protection of the agent's route against hosts spying out route information. One technique for ensuring that a mobile agent arrives safely at its destination is through the use of replication and voting [6].…”
Section: Detection Procedurementioning
confidence: 99%
“…There have been different approaches proposed to protect the platform, host, agent, and route (Westhoff, Schneider, Unger, & Kaderali, 1999). Recently, in order to secure the communication between agents on different hosts, Java Agent Development Framework (JADE) has enabled the Secure Socket Layer (SSL) protocol to provide confidentiality and integrity for all intra-platform connections (Bellifemine, Caire, Poggi, & Rimassa, 2003).…”
Section: Introductionmentioning
confidence: 99%