MOBILE AGENT SECURITY AGAINST MALICIOUS PLATFORMS

被引:5
作者
Ssekibuule, Richard [1 ]
机构
[1] Makerere Univ, Fac Comp & IT, Kampala, Uganda
关键词
malicious platforms; mobile agent; security; threats; ITINERARIES; PROTOCOL; TRUST;
D O I
10.1080/01969722.2010.511550
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents a review of security mechanisms that have been developed for mobile agent security against malicious platforms. It has been almost 10 years since a prominent review of security in agent systems was presented by Jansen (2000). We present new developments that have been suggested over the years, evaluate limitations of these schemes, and highlight possible areas of improvement. This article further presents possible threats to the mobile agent paradigm and distinguishes between detection and prevention security mechanisms.
引用
收藏
页码:522 / 534
页数:13
相关论文
共 50 条
[21]   Security Enhancements for Mobile Agents Platforms [J].
Aouadi, Hamed ;
Ben Ahmed, Mohamed .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (7B) :216-221
[22]   A Novel Solution of Mobile Agent Security: Task-Description-Based Mobile Agent [J].
Che, Haiyan ;
Li, Dali ;
Sun, Jigui ;
Yu, Haibo .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B) :121-125
[23]   A Novel Free-Roaming Mobile Agent Security Protocol Against Colluded Truncation Attacks [J].
Lei, Silei ;
Liu, Jun ;
Deng, Chuan ;
Xiao, Junmo .
2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, :348-353
[24]   Mobile agent security with efficient oblivious transfer [J].
Hasegawa, Watarn ;
Soshi, Masakazu ;
Miyaji, Atsuko .
SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, :299-304
[25]   Shielding security sensitive parts of mobile agent [J].
Preeti ;
Chaturvedi P. ;
Hans R. .
Preeti (preetishivach2009@gmail.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (13) :289-302
[26]   Application Security Models for Mobile Agent Systems [J].
McDonald, J. Todd ;
Yasinsac, Alec .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (03) :43-59
[27]   Security in a mobile agent based DDM infrastructure [J].
Li, Xining .
Autonomous Intelligent Systems: Agents and Data Mining, Proceedings, 2007, 4476 :114-123
[28]   A Trusted Computing Technology for The Security of Mobile Agent [J].
Shen, Zhidong ;
Wu, Xiaoping ;
Honggen Xing .
PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, :124-127
[29]   Wireless Application Protocol for Potential Threats to Mobile Agent Network Security [J].
M. Indra Sena Reddy ;
K. Subba Reddy ;
P. J. Bhatt ;
Rajeev Chetwani .
Journal of Electronic Science and Technology, 2012, (03) :215-219
[30]   Security model based mobile agent for mobile ad hoc networks [J].
Ahmed, Maqbol ;
Okba, Kazar ;
Abdelbasset, Barkat ;
Mouadh, Bali .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 22 (01) :36-54