Mobile agents system security: A systematic survey

P Bagga, R Hans - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A pivotal cause for the boom of Mobile Agent paradigm relies on the competence to ward off
security attacks. This article surveys the prevalent attacks on the mobile agents and the …

[HTML][HTML] Fragmentation based encryption approach for self protected mobile agent

S Srivastava, GC Nandi - Journal of King Saud University-Computer and …, 2014 - Elsevier
Distributed applications provide challenging environment in today's advancing technological
world. To enhance the aspects of better performance and efficiency in real scenario mobile …

Securing mobile agent and its platform from passive attack of malicious mobile agents

MV Prem, S Swamynathan - IEEE-International Conference On …, 2012 - ieeexplore.ieee.org
The mobile agent has been seen as a promising distributed computing technology. The
mobility characteristic of mobile agent makes it to travel often in open network. In this …

A Secure and Fault Tolerant Platform for Mobile Agent Systems

R Bhanot, R Hans - International Journal of Security and Its Applications, 2015 - earticle.net
Mobile agents offer a new paradigm in the field of distributed computing. Mobile agent is a
program which can migrate from one machine to another machine in order to fulfill the …

[PDF][PDF] Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms.

S Alami-Kamouri, N Moukafih, G Orhanou… - J …, 2020 - pdfs.semanticscholar.org
Mobile agent technology quickly emerged in the field of distributed computing. Its use offers
several advantages compared to the classic Client/Server model such as reducing network …

[PDF][PDF] Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts

TM Ahmed - CMC-COMPUTERS MATERIALS & CONTINUA, 2022 - cdn.techscience.cn
Mobile Agent has many benefits over traditional distributed systems such as reducing
latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security …

[PDF][PDF] A Multi a [euro]" Faceted Approach to Mobile Agent Security

AM Ngereki, AM Kahonge - International Journal of Computer …, 2015 - researchgate.net
Mobile agents are increasingly becoming popular in the development of current distributed
applications. However, the mobility and autonomy factors of mobile agents present a host of …

A distributed security approach for intelligent mobile multiagent systems

B Iantovics, B Crainicu - Advanced Intelligent Computational …, 2014 - Springer
Intelligent systems are used for many difficult problems solving, like: clinical decision
support, health status monitoring of humans etc. The intelligence could give to a system …

[PDF][PDF] An enhanced approach for securing mobile agents from the attack of other malicious mobile agents

A Anil, J Anver - International Journal of Research in Engineering …, 2014 - academia.edu
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis
is beginning to move toward developing techniques that are oriented towards protecting the …

Trust analysis of execution platform for self protected mobile code

S Srivastava, D Kumar… - … Conference on Advances …, 2015 - ieeexplore.ieee.org
Malicious host problem is still a challenging phenomenon in agent computing environment.
In mobile agent computing, agent platform has full control over mobile agent to execute it. A …