Mobile agents system security: A systematic survey
A pivotal cause for the boom of Mobile Agent paradigm relies on the competence to ward off
security attacks. This article surveys the prevalent attacks on the mobile agents and the …
security attacks. This article surveys the prevalent attacks on the mobile agents and the …
[HTML][HTML] Fragmentation based encryption approach for self protected mobile agent
S Srivastava, GC Nandi - Journal of King Saud University-Computer and …, 2014 - Elsevier
Distributed applications provide challenging environment in today's advancing technological
world. To enhance the aspects of better performance and efficiency in real scenario mobile …
world. To enhance the aspects of better performance and efficiency in real scenario mobile …
Securing mobile agent and its platform from passive attack of malicious mobile agents
MV Prem, S Swamynathan - IEEE-International Conference On …, 2012 - ieeexplore.ieee.org
The mobile agent has been seen as a promising distributed computing technology. The
mobility characteristic of mobile agent makes it to travel often in open network. In this …
mobility characteristic of mobile agent makes it to travel often in open network. In this …
A Secure and Fault Tolerant Platform for Mobile Agent Systems
R Bhanot, R Hans - International Journal of Security and Its Applications, 2015 - earticle.net
Mobile agents offer a new paradigm in the field of distributed computing. Mobile agent is a
program which can migrate from one machine to another machine in order to fulfill the …
program which can migrate from one machine to another machine in order to fulfill the …
[PDF][PDF] Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms.
S Alami-Kamouri, N Moukafih, G Orhanou… - J …, 2020 - pdfs.semanticscholar.org
Mobile agent technology quickly emerged in the field of distributed computing. Its use offers
several advantages compared to the classic Client/Server model such as reducing network …
several advantages compared to the classic Client/Server model such as reducing network …
[PDF][PDF] Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts
TM Ahmed - CMC-COMPUTERS MATERIALS & CONTINUA, 2022 - cdn.techscience.cn
Mobile Agent has many benefits over traditional distributed systems such as reducing
latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security …
latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security …
[PDF][PDF] A Multi a [euro]" Faceted Approach to Mobile Agent Security
AM Ngereki, AM Kahonge - International Journal of Computer …, 2015 - researchgate.net
Mobile agents are increasingly becoming popular in the development of current distributed
applications. However, the mobility and autonomy factors of mobile agents present a host of …
applications. However, the mobility and autonomy factors of mobile agents present a host of …
A distributed security approach for intelligent mobile multiagent systems
B Iantovics, B Crainicu - Advanced Intelligent Computational …, 2014 - Springer
Intelligent systems are used for many difficult problems solving, like: clinical decision
support, health status monitoring of humans etc. The intelligence could give to a system …
support, health status monitoring of humans etc. The intelligence could give to a system …
[PDF][PDF] An enhanced approach for securing mobile agents from the attack of other malicious mobile agents
A Anil, J Anver - International Journal of Research in Engineering …, 2014 - academia.edu
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis
is beginning to move toward developing techniques that are oriented towards protecting the …
is beginning to move toward developing techniques that are oriented towards protecting the …
Trust analysis of execution platform for self protected mobile code
S Srivastava, D Kumar… - … Conference on Advances …, 2015 - ieeexplore.ieee.org
Malicious host problem is still a challenging phenomenon in agent computing environment.
In mobile agent computing, agent platform has full control over mobile agent to execute it. A …
In mobile agent computing, agent platform has full control over mobile agent to execute it. A …