2002
DOI: 10.1049/ecej:20020504
|View full text |Cite
|
Sign up to set email alerts
|

Mobile agent security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
52
0

Year Published

2003
2003
2017
2017

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 128 publications
(56 citation statements)
references
References 18 publications
0
52
0
Order By: Relevance
“…While there have been quite a few papers written on the significant security concerns. Recent work in mobile agent security has mainly focused on an overview of the main security issues related to the mobile agent paradigm [1][2][3]. Erlaut and Panda J study the mobile agent security mechanism while describe the different security approaches to protect the mobile agents against the malicious host and using the SMA1 digest algorithm to provide the confidentiality and integrity services to the mobile agents.…”
Section: Overview Of Related Existing Workmentioning
confidence: 99%
“…While there have been quite a few papers written on the significant security concerns. Recent work in mobile agent security has mainly focused on an overview of the main security issues related to the mobile agent paradigm [1][2][3]. Erlaut and Panda J study the mobile agent security mechanism while describe the different security approaches to protect the mobile agents against the malicious host and using the SMA1 digest algorithm to provide the confidentiality and integrity services to the mobile agents.…”
Section: Overview Of Related Existing Workmentioning
confidence: 99%
“…Mobile agents become especially vulnerable when traveling among hosts network. Several works have underlined the importance of protecting host against malicious mobile agents [4], [5], [6], [7]. This problem is out of the scope of this paper.…”
Section: Mobile Agent' Self-protectionmentioning
confidence: 99%
“…Many traditional security concerns with mobile agents are related to security of the host platform [24], but in a cloud setting these are mostly alleviated through the virtualization strategies employed. As will be detailed below, the mobile agent paradigm is a very good fit for the intermediate nodes in our design.…”
Section: A Revival For Autonomous Mobile Agentsmentioning
confidence: 99%