2007
DOI: 10.1007/s11416-007-0056-y
|View full text |Cite
|
Sign up to set email alerts
|

TAMAP: a new trust-based approach for mobile agent protection

Abstract: Human activities are increasingly based on the use of distant resources and services, and on the interaction between remotely located parties that may know little about each other. Mobile agents are the most suited technology. They must therefore be prepared to execute on different hosts with various environmental security conditions. This paper introduces a trust-based mechanism to improve the security of mobile agents against malicious hosts and to allow their execution in various environments. It is based o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 34 publications
(45 reference statements)
0
8
0
Order By: Relevance
“…For example, Filiol in [19] uses the environmental key as a basic technique to forbid a Malware code analysis and Hacini [20] employs it to avoid analysis of mobile agent services. So, the environmental key generation approach can be useful when the receiver is not aware of the conditions required to the execution of the requested service.…”
Section: Environmental Keymentioning
confidence: 99%
See 3 more Smart Citations
“…For example, Filiol in [19] uses the environmental key as a basic technique to forbid a Malware code analysis and Hacini [20] employs it to avoid analysis of mobile agent services. So, the environmental key generation approach can be useful when the receiver is not aware of the conditions required to the execution of the requested service.…”
Section: Environmental Keymentioning
confidence: 99%
“…This technique reduces the possibility of the shared data being pilfered by a single host. This idea deserves to be employed by approaches where the mobile agent service (secret) is subdivided in several tasks and when mobile agent carries out a preliminary investigation of trustworthiness of the visited host which shows the selected execution [20].…”
Section: The K-out-of-n Threshold Scheme Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…TAMAP Hacini et al (2007) presented a trust-based scheme for mobile agent protection against malicious and potentially malicious platforms in the year 2007. This scheme is based on interactions between the agent and the platform.…”
Section: R Ssekibuulementioning
confidence: 99%